2004
DOI: 10.1007/s00145-004-0314-9
|View full text |Cite
|
Sign up to set email alerts
|

Short Signatures from the Weil Pairing

Abstract: Abstract. We introduce a short signature scheme based on the Computational Diffie-Hellman assumption on certain elliptic and hyper-elliptic curves. The signature length is half the size of a DSA signature for a similar level of security. Our short signature scheme is designed for systems where signatures are typed in by a human or signatures are sent over a low-bandwidth channel.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
849
0
3

Year Published

2008
2008
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 1,353 publications
(852 citation statements)
references
References 26 publications
0
849
0
3
Order By: Relevance
“…The private verification scheme, based on pseudorandom functions (PRFs), has the shortest response of any POR scheme (20 bytes) with the cost of a longer query. The second scheme used short signatures introduced by Boneh, Lynn and Shacham (BLS) [5] to verify the authentication of data in remote servers, hence assuring public verifiability is secure. At an 80-bit security level, this scheme has the shortest query (20 bytes) and response (40 bytes)of any POR scheme.…”
Section: Compact Proof Of Retrievabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…The private verification scheme, based on pseudorandom functions (PRFs), has the shortest response of any POR scheme (20 bytes) with the cost of a longer query. The second scheme used short signatures introduced by Boneh, Lynn and Shacham (BLS) [5] to verify the authentication of data in remote servers, hence assuring public verifiability is secure. At an 80-bit security level, this scheme has the shortest query (20 bytes) and response (40 bytes)of any POR scheme.…”
Section: Compact Proof Of Retrievabilitymentioning
confidence: 99%
“…With this protocol, user offloads the verification task to a trusted third party auditor. The public verification scheme in [17] used BLS signatures [5] for authentication values instead of utilizing PRF.…”
Section: Public Verification Constructionmentioning
confidence: 99%
“…Further improvements for the POR scheme described in [4] have been introduced in [21] by providing full proofs of security against arbitrary adversaries. In the improved solution, the authors designed one scheme for public verifiability and another for private verifiability [22]. However, the improved scheme is well designed, it lost its advantage as it stored part of the file and the authenticators on the service provider server which made the document protection not fully guaranteed against alterations.…”
Section: Related Workmentioning
confidence: 99%
“…One of the best signatures is Boneh Lynn Shacham signature scheme (Boneh, Lynn, & Shacham, 2004). BLS has signature length 2 times security length.…”
Section: Signing Of a Materials Goodsmentioning
confidence: 99%