Filters








4,407 Hits in 8.4 sec

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes

Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew Pagano
2014 Journal of Computer Security  
We add a new loop-unrolling technique and show that it helps cut the batch verification cost of one scheme by roughly half.  ...  Figure 1 : The flow of AutoBatch. The input is a signature scheme comprised of key generation, signing and verification algorithms, represented in the domain-specific SDL language.  ...  In Section 1.3, we discuss both the success and failure of the past fifteen years in batching digital signatures.  ... 
doi:10.3233/jcs-140507 fatcat:lrmq3wnlhzgxhew6yk3akzn6yy

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes

Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
2012 Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12  
We add a new loop-unrolling technique and show that it helps cut the batch verification cost of one scheme by roughly half.  ...  Figure 1 : The flow of AutoBatch. The input is a signature scheme comprised of key generation, signing and verification algorithms, represented in the domain-specific SDL language.  ...  In Section 1.3, we discuss both the success and failure of the past fifteen years in batching digital signatures.  ... 
doi:10.1145/2382196.2382248 dblp:conf/ccs/Akinyele0HP12 fatcat:f5fqwtbxrbgmth67hltvz4pbiq

Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects

Daojing He, Chun Chen, Jiajun Bu, Sammy Chan, Yan Zhang
2013 IEEE Communications Magazine  
In this article, we first identify the challenges unique to roaming services as a set of mandatory and optional requirements.  ...  Seamless roaming over wireless networks is highly desirable to mobile users, but ensuring the security and efficiency of this process is challenging.  ...  Also, we are grateful to the anonymous reviewers for their valuable comments to improve the quality of the manuscript.  ... 
doi:10.1109/mcom.2013.6461199 fatcat:sxzktd7gjbespk52fcxmw2mrdq

Practical Short Signature Batch Verification [chapter]

Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen
2009 Lecture Notes in Computer Science  
Fortunately, our empirical studies reveal good news: invalid signatures can be detected via a recursive divide-and-conquer approach, and if < 15% of the signatures are invalid, then batch verification  ...  To our knowledge, these are the first known results for batch verification of group and ring signatures, answering an open problem of Camenisch et al. [13] .  ...  When batch verification fails, this divide-and-conquer approach recursively applies the batch verifier to individual halves of the batch, until all invalid invalid signatures have been located.  ... 
doi:10.1007/978-3-642-00862-7_21 fatcat:fmmqap2y7jhr7mpnhwh43suawm

Analytical Study of Modified RSA Algorithms for Digital Signature

Sangita A
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
This paper describes a systematic analysis of RSA and its variation schemes for Digital Signature.  ...  Digital signature has been providing security services to secure electronic transaction.  ...  In the proposed technique of batch verification where the verifier simultaneously verifies a batch in time less than the total time associated with the individual verification of the signatures.  ... 
doi:10.17762/ijritcc2321-8169.150310 fatcat:h2bp4x5ffran5nx366jvo6x3y4

Synchronized aggregate signatures

Jae Hyun Ahn, Matthew Green, Susan Hohenberger
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
Our construction is based on the stateful signatures of Hohenberger and Waters (Eurocrypt 2009).  ...  An aggregate signature scheme is a digital signature scheme where anyone given n signatures on n messages from n users can aggregate all these signatures into a single short signature.  ...  Acknowledgments The authors are grateful to Brent Waters and the ACM CCS 2010 anonymous reviewers for their helpful comments. The authors were supported by NSF Grant CNS-0716142 and Department of  ... 
doi:10.1145/1866307.1866360 dblp:conf/ccs/AhnGH10 fatcat:vavqelqhs5bjtp64533mtzsxgy

Short one-time signatures

Douglas Stinson, Gregory Zaverucha
2011 Advances in Mathematics of Communications  
Our new scheme is also the first one-time signature scheme that supports aggregation, batch verification, and which admits efficient proofs of knowledge.  ...  It has a fast signing algorithm, requiring only modular additions, and its verification cost is comparable to ECDSA verification.  ...  Olumofin and C. Swanson). This research was supported by NSERC discovery grant 203114-06, and an NSERC PGS scholarship. We also thank Payman Mohassel for pointing out [4] .  ... 
doi:10.3934/amc.2011.5.473 fatcat:zjmrb2kclfcyvjz73e5h52v4uu

A new batch verification scheme for ECDSA $$^*$$ ∗ signatures

Apurva S Kittur, Alwyn R Pais
2019 Sadhana (Bangalore)  
In this paper, we propose an efficient batch verification algorithm for ECDSA Ã (Elliptic Curve Digital Signature Algorithm) Ã signatures.  ...  Our scheme is efficient for both single and multiple signers. ECDSA Ã signature is a modified version of ECDSA, which accelerates the verification of ECDSA signature by more than 40%.  ...  Acknowledgements The authors would like to thank Ministry of Electronics & Information Technology (MeitY), Government of India, for their support in a part of the research.  ... 
doi:10.1007/s12046-019-1142-9 fatcat:tbv3nbv2hvfirgmhfghicye4zq

Basic Model of Multicast Authentication Based On Batch Signature-MABS

Hilda C.P, Mr. Liaqat Ali khan, M.Grace Vennice
2013 International Journal of Computer Science and Informatics  
a signature, and spread the effect of the Signature across all the packets in the block.  ...  For which we are going to propose novel multicast authentication protocol called MABS (Multicast Authentication Based on Batch Signature) by including two specified schemes MABS-B and MABS-E.  ...  As it is well known that existing digital signature algorithms are computationally expensive, the ideal approach raises a serious challenge to receivers' computational capabilities. II.  ... 
doi:10.47893/ijcsi.2013.1086 fatcat:vhmwbtkmybckpnwi6nb4fdnyr4

MABS: Multicast Authentication Based on Batch Signature

Yun Zhou, Xiaoyan Zhu, Yuguang Fang
2010 IEEE Transactions on Mobile Computing  
overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously.  ...  with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms.  ...  The works of Fang and Zhu were also partially supported by the 111 Project under Grant B08038.  ... 
doi:10.1109/tmc.2010.37 fatcat:hjcbs52v3rggrf3fa5ql2sxj2i

Comparison analysis in Multicast Authentication based on Batch Signature (MABS) in Network Security [article]

Srikanth Bethu, K Kanthi Kumar, MD Asrar Ahmed, S.Soujanya
2013 arXiv   pre-print
overhead due to an efficient cryptographic primitive called batch signature, which supports the authentication of any number of packets simultaneously.so we discuss their comparisons and performance evaluation  ...  with a signature, and spread the effect of the signature across all the packets in the block through hash graphs or coding algorithms.  ...  (iii) We propose two new batch signature schemes based on BLS and DSA and show they are more efficient than the batch RSA [5] signature scheme.  ... 
arXiv:1311.6001v1 fatcat:rshsqe2b55cyhgakhc435o4oze

Secure Cloud Data Audit using Protocol and Digital Signature Techniques

2019 International journal of recent technology and engineering  
(RDAP) and Remote Data Audit using Digital Signature (RDADS) methods.  ...  So that, storage service creates data security challenges. Therefore, the integrity of the outsourced data has to be verified frequently using public or private verification method.  ...  We have provided a protocol and digital signature based on cryptography approaches to address the data security issues in the cloud.  ... 
doi:10.35940/ijrte.d6970.118419 fatcat:u3wthck6srcvvi4e2vojzb4uyi

Deep Learning Methods for Signature Verification [article]

Zihan Zeng, Jing Tian
2019 arXiv   pre-print
Signature is widely used in human daily lives, and serves as a supplementary characteristic for verifying human identity. However, there is rare work of verifying signature.  ...  Our numerical experiments demonstrate the effectiveness of our constructed models and features representations.  ...  The above challenges aggravate the success of accurate verification.  ... 
arXiv:1912.05435v1 fatcat:w4rfsulgyvg7dg27dbhc2xmroi

Server-aided signatures verification secure against collusion attack

Sherman S. M. Chow, Man Ho Au, Willy Susilo
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
In server-aided verification (SAV), a substantial part of the verification computation can be offloaded to a powerful but possibly untrusted server.  ...  In particular, it suggests SAV protocols for short signatures in the standard model and aggregate signatures which have not been studied before.  ...  Comparison with Batch Signature Verification. The concepts of using batch pairing delegation for verifying many signatures and batch signature verification look almost the same at the first glance.  ... 
doi:10.1145/1966913.1966967 dblp:conf/ccs/ChowAS11 fatcat:2r3zzv4axzelpmoaj5ntzjjdle

Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System

2019 KSII Transactions on Internet and Information Systems  
An identity-based batch verification (IBV) scheme was recently proposed to enhance the security and efficiency of the ADS-B system, but current IBV schemes are often too resource intensive because of the  ...  In this paper, we propose a lightweight IBV signature scheme for the ADS-B system that is robust against adaptive chosen message attacks in the random oracle model, and ensures the security of batch message  ...  A number of identity-based batch verification (IBV) signatures have been proposed to address these challenges. Yang et al.  ... 
doi:10.3837/tiis.2019.12.024 fatcat:353qol5wujgctkf7d7p2bytofq
« Previous Showing results 1 — 15 out of 4,407 results