Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Improved Digital Signature Suitable for Batch Verification
IEEE Transactions on Computers
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
An Identity-Based Signature from Gap Diffie-Hellman Groups
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
An efficient identity-based signature scheme with batch verifications
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
IEEE Transactions on Computers
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Batch verifications with ID-Based signatures
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Hi-index | 0.00 |
Batch verification can improve efficiency when the verifier has to verify a great deal of signatures. With the rising interests on pairing-based cryptography, many researches on identity-based signatures have been proposed. Furthermore, some new researches on enhancing performance of verifying identity-based signatures by a batch verification have also been reported. Another possible weaker but faster batch checking of signatures, named as the batch screening, has been considered in the literature. This paper considers the security of recent batch verification schemes, and a new attack on one identity-based signature scheme with batch screening is proposed. Then, we point out that a previous attack on another identity-based signature scheme with batch screening is inappropriate due to the misunderstanding of the difference between batch screening and verification.