2014
DOI: 10.3233/jcs-140507
|View full text |Cite
|
Sign up to set email alerts
|

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes

Abstract: As devices everywhere increasingly communicate with each other, many security applications will require low-bandwidth signatures that can be processed quickly. Pairing-based signatures can be very short, but are often costly to verify. Fortunately, they also tend to have efficient batch verification algorithms. Finding these batching algorithms by hand, however, can be tedious and error prone.We address this by presenting AutoBatch, an automated tool for generating batch verification code in either Python or C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 57 publications
0
12
0
Order By: Relevance
“…In several pairing‐based signature schemes, the verifier needs to perform the validity check that involves more than one pairing computation . One common technique is to consolidate the verification equation . In our case, we have many pairing equations associated to NIWI proof.…”
Section: The Converted Ring Signature Scheme In Prime Ordermentioning
confidence: 99%
“…In several pairing‐based signature schemes, the verifier needs to perform the validity check that involves more than one pairing computation . One common technique is to consolidate the verification equation . In our case, we have many pairing equations associated to NIWI proof.…”
Section: The Converted Ring Signature Scheme In Prime Ordermentioning
confidence: 99%
“…Several works have recently considered automated generation and/or analysis of cryptographic algorithms. Akinyele et al [AGHP12,AGH13] developed tools for automatically generating batch-verification algorithms for digital-signature schemes [AGHP12], for converting schemes using symmetric bilinear groups into ones using asymmetric bilinear groups [AGH13], and for compiling signature schemes to schemes achieving stronger security properties [AGH13]. In all these cases, their tools do not directly analyze or verify security of new constructions; instead, they take as input schemes that are assumed to be secure, and then attempt to apply a fixed set of transformations that have been proven to preserve (or amplify) security.…”
Section: Prior Workmentioning
confidence: 99%
“…In order to resolve the problem, ‘batch verification’, which allows to verify many signatures at a time, has attracted much attention. Batch verification can be used for diverse applications , for example, authenticated database, auction/bidding system, electronic commerce treating many coins, and voting protocols to verify a huge number of votes and vehicular communications. Also, the primary examples in cryptographic protocols include multiparty key agreement (KA) and multiparty computation.…”
Section: Introductionmentioning
confidence: 99%
“…Batch verification for an IBS scheme has been suggested to authenticate multiple signatures at a time while still gaining the advantage of the simplified key management procedure. In particular, it is applicable when resource requirements are restricted, because an IBS scheme uses short public keys or identities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation