2007
DOI: 10.1007/978-3-540-72540-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Batch Verification of Short Signatures

Abstract: Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particular requirements on the applicable cryptographic primitives. For instance, several applications require that communication overhead be small and that many messages be processed at the same time. In this paper we consider the suitability of public key signatures in the latter scenario. That is, we consider signatures that are 1) short … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 111 publications
(22 citation statements)
references
References 32 publications
0
22
0
Order By: Relevance
“…For instance, 3 pairing operations are required to verify a single signature. With the batch verification scheme of [30], verifying n signatures also takes 3 pairing operations instead of 3n pairing operations. In other words, the verification time of the dominant operation (i.e., paring) is independent of the number of signatures to verify.…”
Section: Batch Verificationmentioning
confidence: 99%
See 2 more Smart Citations
“…For instance, 3 pairing operations are required to verify a single signature. With the batch verification scheme of [30], verifying n signatures also takes 3 pairing operations instead of 3n pairing operations. In other words, the verification time of the dominant operation (i.e., paring) is independent of the number of signatures to verify.…”
Section: Batch Verificationmentioning
confidence: 99%
“…Therefore, the batch verification can dramatically decrease the time spent on verifying a large number of signatures, which can achieve much better scalability. In this paper, we propose an efficient identity-based batch verification scheme based on the improved CL signature scheme in [30].…”
Section: Batch Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…i is the identity-based signature on r i . To keep the whole protocol efficient, one may choose an identity-based signature scheme that supports batch verification [11,28] to generate . i .…”
Section: The Proposalmentioning
confidence: 99%
“…The delay caused by verifying a bulk of signatures may radically impede the transmission throughput and impair the system scalability. A possible promising approach to improve the verification efficiency is to employ batch verification [6][7][8][9][10][11], which permits verifying a large number of signatures simultaneously instead of sequentially. This decreases the number of time-consuming operations, especially when authenticating a large number of signatures.…”
Section: Introductionmentioning
confidence: 99%