Skip to main content
Log in

A New Batch Verifying Scheme for Identifying Illegal Signatures

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures. In this article, we analyze the complexity of the batch verifying schemes defined by Li, Hwang and Chen in 2010, and propose a new batch verifying multiple digital signature scheme, in two variants: one for RSA – by completing the Harn’s schema with an identifying illegal signatures algorithm, and the other adapted for a modified Elliptic Curve Digital Signature Algorithm protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bellare M, Garay J A, Rabin T. Fast batch verification for modular exponentiation and digital signatures. In Lecture Notes in Computer Science 1403, Nyberg K (ed.), Springer-Verlag, 1998, pp.236-250.

  2. Boyd C, Pavlovski C. Attacking and repairing batch verification schemes. In Proc. the 6th ASIACRYPT, Dec. 1976, pp.58-71.

  3. Camenish J, Hohenberger S, Pedersen M. Batch verification of short signatures. In Proc. the 26th EUROCRYPT, May 2007, pp.246-263.

  4. Hwang M, Lee C, Tang Y. Two simple batch verifying multiple digital signatures. In Proc. the 3rd ICICS, Nov. 2001, pp.233-237.

  5. Lim C H. Efficient multi-exponentation and application to batch verification of digital signatures. 2000, http://dasan.sejong.ac.kr/~chlim/pub/multi_exp.ps.

  6. Kim K, Yie I, Lim S, Park H. A method of finding bad signatures in an RSA-type batch verification. Informatica, 2011, 22(2): 189-201.

    MathSciNet  Google Scholar 

  7. Kirn K, Yie I, Lim S, Nyang D. Batch verification and finding invalid signatures in a group signature scheme. International Journal of Network Security, 2011, 13(2): 61-70.

    Google Scholar 

  8. Lee S, Cho S, Choi J, Cho Y. Efficient identification of bad signatures in RSA-type batch signature. IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences, 2006, E89-A(1): 74-80.

    Article  Google Scholar 

  9. Matt B. Identification of multiple invalid signatures in pairing-based batched signatures. In Proc. the 12th Int. Conf. Practice and Theory in Public Key Cryptography, March 2009, pp.337-356.

  10. Bao F, Lee C, Hwang M. Cryptanalysis and improvement on batch verifying multiple RSA digital signatures. Applied Mathematics and Computation, 2006, 172(2): 1195-1200.

    Article  MathSciNet  MATH  Google Scholar 

  11. Cao T, Lin D, Xue R. Security analysis of some batch verifying signatures from pairings. International Journal of Network Security, 2006, 3(2): 138-143.

    Google Scholar 

  12. Hwang M, Lin I, Hwang K. Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica (Lithuanian Academy of Sciences), 2000, 11(1): 15-19.

    MathSciNet  MATH  Google Scholar 

  13. Lim C, Lee P. Security of interactive DSA batch verification. Electronics Letters, 1994, 30(19): 1592-1593.

    Article  Google Scholar 

  14. Selvi S S D, Vivek S S, Shriram J et al. Security analysis of aggregate signature and batch verification signature schemes. IACR Crptology ePrint Archive, 2009, http://eprint.iacr.org/2009/290.pdf.

  15. Stanek M. Attacking LCCC batch verification of RSA signatures. IACR Cryptology ePrint Archive, 2006, http://eprint.iacr.org/2006/111.pdf.

  16. Ferrara A, Green M, Hohenberger S, Pedersen M. On the practicality of short signature batch verification. IACR Cryptology ePrint Archive, 2008, http://eprint.iacr.org/2008/015.pdf.

  17. Cheon J H, Kim Y, Yoon H J. A new ID-based signature with batch verification. Cryptology ePrint Archive, 2004, http://eprint.iacr.org/2004/131.pdf.

  18. Cui S, Duan P, Chan C W. An efficient identity-based signature scheme with batch verifications. In Proc. the 1st InfoScale, May 29-June 1, 2006, Article No.22.

  19. Yoon H, Cheon J H, Kim Y. Batch verifications with ID-based signatures. In Proc. the 7th ICISC, Dec. 2004, pp.233-248.

  20. Tzeng S, Lee C, Hwang M. A batch verification for multiple proxy signature. Parallel Processing Letters, 2011, 21(1): 77-84.

    Article  MathSciNet  MATH  Google Scholar 

  21. Zhang C, Ho P, Tapolcai J. On batch verification with group testing for vehicular communications. Wireless Network, 2011, 17(8): 1851-1865.

    Article  Google Scholar 

  22. Changchien S W, Hwang M. A batch verifying and detecting multiple RSA digital signatures. International Journal of Computational and Numerical Analysis and Applications, 2002, 2(3): 303-307.

    MathSciNet  MATH  Google Scholar 

  23. Fiat A. Batch RSA. In Proc. the 9th CRYPTO, August 1989, pp.175-185.

  24. Harn L. Batch verifying multiple RSA digital signatures. Electronics Letters, 1998, 34(12): 1219-1220.

    Article  Google Scholar 

  25. Harn L. Batch verifying multiple DSA digital signatures. Electronics Letters, 1998, 34(9): 870-871.

    Article  Google Scholar 

  26. Li C, Hwang M, Chen S. A batch verifying and detecting the illegal signatures. International Journal of Innovative Computing, Information and Control, 2010, 6(12): 5311-5320.

    Google Scholar 

  27. Stinton D. Cryptography Theory and Practice (2nd edition). Chapman & Hall/CRC, 2002.

  28. Cohen H, Frey G. Handbook of Elliptic and Hyperelliptic Curve Cryptography (Discrete Mathematics and Its Applications). Chapman & Hall/CRC, 2005.

  29. Hankerson D, Menezes A, Vanstome S. Guide to Elliptic Curve Criptography. Springer Verlag, 2004.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adrian Atanasiu.

Electronic Supplementary Material

Below is the link to the electronic supplementary material.

(DOC 28.0 KB)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Atanasiu, A. A New Batch Verifying Scheme for Identifying Illegal Signatures. J. Comput. Sci. Technol. 28, 144–151 (2013). https://doi.org/10.1007/s11390-013-1318-4

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-013-1318-4

Keywords

Navigation