Abstract
The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures. In this article, we analyze the complexity of the batch verifying schemes defined by Li, Hwang and Chen in 2010, and propose a new batch verifying multiple digital signature scheme, in two variants: one for RSA – by completing the Harn’s schema with an identifying illegal signatures algorithm, and the other adapted for a modified Elliptic Curve Digital Signature Algorithm protocol.
Similar content being viewed by others
References
Bellare M, Garay J A, Rabin T. Fast batch verification for modular exponentiation and digital signatures. In Lecture Notes in Computer Science 1403, Nyberg K (ed.), Springer-Verlag, 1998, pp.236-250.
Boyd C, Pavlovski C. Attacking and repairing batch verification schemes. In Proc. the 6th ASIACRYPT, Dec. 1976, pp.58-71.
Camenish J, Hohenberger S, Pedersen M. Batch verification of short signatures. In Proc. the 26th EUROCRYPT, May 2007, pp.246-263.
Hwang M, Lee C, Tang Y. Two simple batch verifying multiple digital signatures. In Proc. the 3rd ICICS, Nov. 2001, pp.233-237.
Lim C H. Efficient multi-exponentation and application to batch verification of digital signatures. 2000, http://dasan.sejong.ac.kr/~chlim/pub/multi_exp.ps.
Kim K, Yie I, Lim S, Park H. A method of finding bad signatures in an RSA-type batch verification. Informatica, 2011, 22(2): 189-201.
Kirn K, Yie I, Lim S, Nyang D. Batch verification and finding invalid signatures in a group signature scheme. International Journal of Network Security, 2011, 13(2): 61-70.
Lee S, Cho S, Choi J, Cho Y. Efficient identification of bad signatures in RSA-type batch signature. IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, 2006, E89-A(1): 74-80.
Matt B. Identification of multiple invalid signatures in pairing-based batched signatures. In Proc. the 12th Int. Conf. Practice and Theory in Public Key Cryptography, March 2009, pp.337-356.
Bao F, Lee C, Hwang M. Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Applied Mathematics and Computation, 2006, 172(2): 1195-1200.
Cao T, Lin D, Xue R. Security analysis of some batch verifying signatures from pairings. International Journal of Network Security, 2006, 3(2): 138-143.
Hwang M, Lin I, Hwang K. Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica (Lithuanian Academy of Sciences), 2000, 11(1): 15-19.
Lim C, Lee P. Security of interactive DSA batch verification. Electronics Letters, 1994, 30(19): 1592-1593.
Selvi S S D, Vivek S S, Shriram J et al. Security analysis of aggregate signature and batch verification signature schemes. IACR Crptology ePrint Archive, 2009, http://eprint.iacr.org/2009/290.pdf.
Stanek M. Attacking LCCC batch verification of RSA signatures. IACR Cryptology ePrint Archive, 2006, http://eprint.iacr.org/2006/111.pdf.
Ferrara A, Green M, Hohenberger S, Pedersen M. On the practicality of short signature batch verification. IACR Cryptology ePrint Archive, 2008, http://eprint.iacr.org/2008/015.pdf.
Cheon J H, Kim Y, Yoon H J. A new ID-based signature with batch verification. Cryptology ePrint Archive, 2004, http://eprint.iacr.org/2004/131.pdf.
Cui S, Duan P, Chan C W. An efficient identity-based signature scheme with batch verifications. In Proc. the 1st InfoScale, May 29-June 1, 2006, Article No.22.
Yoon H, Cheon J H, Kim Y. Batch verifications with ID-based signatures. In Proc. the 7th ICISC, Dec. 2004, pp.233-248.
Tzeng S, Lee C, Hwang M. A batch verification for multiple proxy signature. Parallel Processing Letters, 2011, 21(1): 77-84.
Zhang C, Ho P, Tapolcai J. On batch verification with group testing for vehicular communications. Wireless Network, 2011, 17(8): 1851-1865.
Changchien S W, Hwang M. A batch verifying and detecting multiple RSA digital signatures. International Journal of Computational and Numerical Analysis and Applications, 2002, 2(3): 303-307.
Fiat A. Batch RSA. In Proc. the 9th CRYPTO, August 1989, pp.175-185.
Harn L. Batch verifying multiple RSA digital signatures. Electronics Letters, 1998, 34(12): 1219-1220.
Harn L. Batch verifying multiple DSA digital signatures. Electronics Letters, 1998, 34(9): 870-871.
Li C, Hwang M, Chen S. A batch verifying and detecting the illegal signatures. International Journal of Innovative Computing, Information and Control, 2010, 6(12): 5311-5320.
Stinton D. Cryptography Theory and Practice (2nd edition). Chapman & Hall/CRC, 2002.
Cohen H, Frey G. Handbook of Elliptic and Hyperelliptic Curve Cryptography (Discrete Mathematics and Its Applications). Chapman & Hall/CRC, 2005.
Hankerson D, Menezes A, Vanstome S. Guide to Elliptic Curve Criptography. Springer Verlag, 2004.
Author information
Authors and Affiliations
Corresponding author
Electronic Supplementary Material
Below is the link to the electronic supplementary material.
Rights and permissions
About this article
Cite this article
Atanasiu, A. A New Batch Verifying Scheme for Identifying Illegal Signatures. J. Comput. Sci. Technol. 28, 144–151 (2013). https://doi.org/10.1007/s11390-013-1318-4
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-013-1318-4