메뉴 건너뛰기




Volumn 5443, Issue , 2009, Pages 337-356

Identification of multiple invalid signatures in pairing-based batched signatures

Author keywords

Batch verification; Identity based signatures; Pairing based signatures; Short signatures; Wireless networks

Indexed keywords

CHROMIUM COMPOUNDS; COMPUTATION THEORY; PUBLIC KEY CRYPTOGRAPHY; WIRELESS NETWORKS;

EID: 67049087745     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00468-1_19     Document Type: Conference Paper
Times cited : (23)

References (30)
  • 1
    • 50849114523 scopus 로고    scopus 로고
    • Fast batch verification for modular exponen-tiation and digital signatures
    • Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
    • Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponen-tiation and digital signatures. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS,vol. 1403, pp. 236-250. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1403 , pp. 236-250
    • Bellare, M.1    Garay, J.A.2    Rabin, T.3
  • 2
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the weil pairing
    • Boyd,C, ed, ASIACRYPT 2001, Springer, Heidelberg
    • Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd,C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514-532. Springer, Heidelberg(2001)
    • (2001) LNCS , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 3
    • 84937411766 scopus 로고    scopus 로고
    • Attacking and repairing batch verification schemes
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Hei-delberg
    • Boyd, C., Pavlovski, C.: Attacking and repairing batch verification schemes. In:Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 58-71. Springer, Hei-delberg (2000)
    • (2000) LNCS , vol.1976 , pp. 58-71
    • Boyd, C.1    Pavlovski, C.2
  • 4
    • 0242696192 scopus 로고    scopus 로고
    • Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In:ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). ACM, New York (2002)
    • Buchegger, S., Boudec, J.-Y.L.: Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc NeTworks). In:ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). ACM, New York (2002)
  • 5
    • 38049146172 scopus 로고    scopus 로고
    • Camenisch, J., Hohenberger, S., Pedersen, M.: Batch verification of short signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, 4515, pp. 246-263.Springer, Heidelberg (2007); see also Cryptology ePrint Archive, Report 2007/172,2007, http://eprint.iacr.org/2007/172
    • Camenisch, J., Hohenberger, S., Pedersen, M.: Batch verification of short signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 246-263.Springer, Heidelberg (2007); see also Cryptology ePrint Archive, Report 2007/172,2007, http://eprint.iacr.org/2007/172
  • 6
    • 35248844436 scopus 로고    scopus 로고
    • Cha, J., Cheon, J.: An identity-based signature from gap die-hellman groups. In:Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 18-30. Springer, Heidelberg (2002)
    • Cha, J., Cheon, J.: An identity-based signature from gap die-hellman groups. In:Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18-30. Springer, Heidelberg (2002)
  • 7
    • 1242310099 scopus 로고    scopus 로고
    • Fall, K.: A delay-tolerant network architecture for challenged internets. In:SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 27-34 (2003)
    • Fall, K.: A delay-tolerant network architecture for challenged internets. In:SIGCOMM 2003: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 27-34 (2003)
  • 8
    • 67650224819 scopus 로고    scopus 로고
    • On the practicalityof short signature batch verification. Cryptology ePrint Archive
    • Report 2008/015
    • Ferrara, A.L., Green, M., Hohenberger, S., Pedersen, M.O.: On the practicalityof short signature batch verification. Cryptology ePrint Archive, Report 2008/015 (2008), http://eprint.iacr.org/2008/015
    • (2008)
    • Ferrara, A.L.1    Green, M.2    Hohenberger, S.3    Pedersen, M.O.4
  • 9
    • 84921021973 scopus 로고    scopus 로고
    • Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, 435, pp.175-185. Springer, Heidelberg (1990)
    • Fiat, A.: Batch RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp.175-185. Springer, Heidelberg (1990)
  • 10
    • 23944459661 scopus 로고    scopus 로고
    • Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westho, D. (eds.) ESAS2004. LNCS, 3313, pp. 2-18. Springer, Heidelberg (2005)
    • Gaubatz, G., Kaps, J.-P., Sunar, B.: Public key cryptography in sensor networks-revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westho, D. (eds.) ESAS2004. LNCS, vol. 3313, pp. 2-18. Springer, Heidelberg (2005)
  • 12
    • 33746734238 scopus 로고    scopus 로고
    • Granger, R., Page, D.L., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, 4076,pp. 480-494. Springer, Heidelberg (2006)
    • Granger, R., Page, D.L., Smart, N.P.: High security pairing-based cryptography revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076,pp. 480-494. Springer, Heidelberg (2006)
  • 13
    • 33749564652 scopus 로고    scopus 로고
    • On computing products of pairings. Cryptology ePrint Archive
    • Report 2006/172
    • Granger, R., Smart, N.P.: On computing products of pairings. Cryptology ePrint Archive, Report 2006/172 (2006), http://eprint.iacr.org/2006/172
    • (2006)
    • Granger, R.1    Smart, N.P.2
  • 14
    • 38149073980 scopus 로고    scopus 로고
    • Law, L., Matt, B.J.: Finding invalid signatures in pairing based batches. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, 4887, pp. 35-53.Springer, Heidelberg (2007)
    • Law, L., Matt, B.J.: Finding invalid signatures in pairing based batches. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 35-53.Springer, Heidelberg (2007)
  • 15
    • 33646843415 scopus 로고    scopus 로고
    • Lee, S.-W., Cho, S., Choi, J., Cho, Y.: Batch verification with DSA-type digital signatures for ubiquitous computing. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, 3802, pp. 125-130. Springer, Heidelberg (2005)
    • Lee, S.-W., Cho, S., Choi, J., Cho, Y.: Batch verification with DSA-type digital signatures for ubiquitous computing. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS, vol. 3802, pp. 125-130. Springer, Heidelberg (2005)
  • 17
    • 78650297815 scopus 로고    scopus 로고
    • Identification of multiple invalid signatures in pairing-based batched signatures
    • Matt, B.J.: Identification of multiple invalid signatures in pairing-based batched signatures. Cryptology ePrint Archive (2009), http://eprint.iacr.org/2009
    • (2009) Cryptology ePrint Archive
    • Matt, B.J.1
  • 18
    • 84948995055 scopus 로고    scopus 로고
    • Naccache, D., MRahi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A. Be improved? In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, 950, pp. 77-85. Springer, Heidelberg (1995)
    • Naccache, D., MRahi, D., Vaudenay, S., Raphaeli, D.: Can D.S.A. Be improved? In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 77-85. Springer, Heidelberg (1995)
  • 20
    • 84957804123 scopus 로고    scopus 로고
    • Pastuszak, J., Michalek, D., Pieprzyk, J., Seberry, J.: Identification of bad signatures in batches. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, 1751, pp. 28-45. Springer, Heidelberg (2000)
    • Pastuszak, J., Michalek, D., Pieprzyk, J., Seberry, J.: Identification of bad signatures in batches. In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 28-45. Springer, Heidelberg (2000)
  • 24
    • 0000211152 scopus 로고
    • Class number, a theory of factorization and genera
    • AMS
    • Shanks, D.: Class number, a theory of factorization and genera. In: Symposium on Pure Mathematics, vol. 20, pp. 415-440. AMS (1971)
    • (1971) Symposium on Pure Mathematics , vol.20 , pp. 415-440
    • Shanks, D.1
  • 25
    • 67049122567 scopus 로고    scopus 로고
    • Attacking LCCC batch verification of RSA signatures. Cryptology ePrint Archive
    • Report 2006/111
    • Stanek, M.: Attacking LCCC batch verification of RSA signatures. Cryptology ePrint Archive, Report 2006/111 (2006), http://eprint.iacr.org/2006/ 111
    • (2006) , pp. 111
    • Stanek, M.1
  • 27
    • 67049089977 scopus 로고    scopus 로고
    • Wagner, D.: The conventional wisdom about sensor network security. is wrong. In: IEEE Security and Privacy 2005, and invited panelist, Security in Ad-hoc and Sensor Networks 2005 (2005)
    • Wagner, D.: The conventional wisdom about sensor network security. is wrong. In: IEEE Security and Privacy 2005, and invited panelist, Security in Ad-hoc and Sensor Networks 2005 (2005)
  • 28
    • 0029342134 scopus 로고
    • Improved digital signature suitable for batch verification
    • Yen, S., Laih, C.: Improved digital signature suitable for batch verification. IEEE Transactions on Computers 44(7), 957-959 (1995)
    • (1995) IEEE Transactions on Computers , vol.44 , Issue.7 , pp. 957-959
    • Yen, S.1    Laih, C.2
  • 29
    • 24944445896 scopus 로고    scopus 로고
    • Yoon, H., Cheon, J.H., Kim, Y.: Batch verifications with ID-based signatures. In:Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, pp. 223-248. Springer,Heidelberg (2005)
    • Yoon, H., Cheon, J.H., Kim, Y.: Batch verifications with ID-based signatures. In:Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 223-248. Springer,Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.