Batch verifications with ID-Based signatures

  • Authors:
  • HyoJin Yoon;Jung Hee Cheon;Yongdae Kim

  • Affiliations:
  • ISaC and Department of Mathematical Sciences, Seoul National University, Korea;ISaC and Department of Mathematical Sciences, Seoul National University, Korea;Department of Computer Science, University of Minnesota – Twin Cities

  • Venue:
  • ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

An identity (ID)-based signature scheme allows any pair of users to verify each other’s signatures without exchanging public key certificates. With the advent of Bilinear maps, several ID-based signatures based on the discrete logarithm problem have been proposed. While these signatures have an advantage in the fact that the system secret can be shared by several parties using a threshold scheme (thereby overcoming the security problem of RSA-based ID-based signature schemes), they all share the same efficiency disadvantage. To overcome this, some schemes have focused on finding ways to verify multiple signatures at the same time (i.e. the batch verification problem). While they had some success in improving efficiency of verification, each had a slightly diversified definition of batch verification. In this paper, we propose a taxonomy of batch verification against which we analyze security of well-known ID-based signature schemes. We also propose a new ID-based signature scheme that allows for all types of multiple signature batch verification, and prove its security in random oracle model.