Handbook of Applied Cryptography
Handbook of Applied Cryptography
Authentication of Concast Communication
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Group testing and batch verification
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Hi-index | 0.00 |
Al-Ibrahim, Ghodosi and Pieprzyk proposed several methods of batch signature verification suitable for concast communication. These schemes are all based on El-Gamal-type signature schemes. We prove that their preferred scheme, which does not require interaction among the various signers, is insecure.