2011
DOI: 10.1007/s00145-011-9108-z
|View full text |Cite
|
Sign up to set email alerts
|

Batch Verification of Short Signatures

Abstract: With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particular requirements on the applicable cryptographic primitives. For instance, a frequent requirement is that the communication overhead inflicted be small and that many messages be processable at the same time. In this paper, we consider the suitability of public key signatures in the latter scenario. That is, we consider signatures that are 1) sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
73
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 78 publications
(75 citation statements)
references
References 41 publications
(80 reference statements)
2
73
0
Order By: Relevance
“…In this scheme the vehicles use pseudonyms to communicate with the RSU, which ensure privacy to the users. In [6] , Zhang et.al., addressed identity based batch signature verification [7] scheme. In this scheme RSU verifies multiple signatures at the same time so that it reduces the verification time.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this scheme the vehicles use pseudonyms to communicate with the RSU, which ensure privacy to the users. In [6] , Zhang et.al., addressed identity based batch signature verification [7] scheme. In this scheme RSU verifies multiple signatures at the same time so that it reduces the verification time.…”
Section: Related Workmentioning
confidence: 99%
“…In the recent years, various authors have proposed privacy preserving authentication schemes for secure message communication. The two most common privacy preserving authentication schemes are the pseudonyms based privacy preserving scheme [4][5][6][7][8][9][10][11][12]22, 24], the group signature based privacy preserving scheme [13][14][15][16][17]. Each scheme provides solution to the secure privacy preserving message communication problems in VANET but all of them have some drawbacks.…”
Section: Introductionmentioning
confidence: 99%
“…The real implementation of the transmission functionality is built on top of signatures. This makes the implementation very efficient, as hash trees allow several messages (sent in the same round) to be signed with almost the same computation effort as a single one [29], and signatures can be verified in batches [12]. An implementation of F tr is given in App.…”
Section: Building Blocksmentioning
confidence: 99%
“…To keep the whole protocol efficient, one may choose an identity-based signature scheme that supports batch verification [12] to generate i . The material used to generate the encryption/decryption key is described in Table 1, in which z i,i = z i,i is not published, but is kept secret by U i .…”
Section: The Proposalmentioning
confidence: 99%