Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382248
|View full text |Cite
|
Sign up to set email alerts
|

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes

Abstract: As devices everywhere increasingly communicate with each other, many security applications will require low-bandwidth signatures that can be processed quickly. Pairing-based signatures can be very short, but are often costly to verify. Fortunately, they also tend to have efficient batch verification algorithms. Finding these batching algorithms by hand, however, can be tedious and error prone.We address this by presenting AutoBatch, an automated tool for generating batch verification code in either Python or C… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 54 publications
(56 reference statements)
0
11
0
Order By: Relevance
“…For example, a number of protocols have been proposed for the value added services in Vehicular Ad-hoc Networks (VANET) [12], [13], [14], public-private key-based vehicular communication system [15], [16], [17], and digital signatures in batch to achieve high efficiency [18], [19]. Several SMS-based wireless protocols [20], [21], [22], [23], lightweight AKA [7] and SMS-based attacks and their countermeasures are discussed in [8].…”
Section: Existing Solutionsmentioning
confidence: 99%
“…For example, a number of protocols have been proposed for the value added services in Vehicular Ad-hoc Networks (VANET) [12], [13], [14], public-private key-based vehicular communication system [15], [16], [17], and digital signatures in batch to achieve high efficiency [18], [19]. Several SMS-based wireless protocols [20], [21], [22], [23], lightweight AKA [7] and SMS-based attacks and their countermeasures are discussed in [8].…”
Section: Existing Solutionsmentioning
confidence: 99%
“…Batch verification, which is firstly introduced by Naccache et al [40], is used to verify multiple signatures simultaneously consuming less time than verifying total individual signatures. Successive research results have achieved improvements in terms of efficiency and security [1,3,4,5,8,9,21,27,51]. There also have been researches for batch signature schemes [22,42,53] and batch generation of exponentiations [10,39].…”
Section: Introductionmentioning
confidence: 99%
“…In order to resolve the problem, ‘batch verification’, which allows to verify many signatures at a time, has attracted much attention. Batch verification can be used for diverse applications , for example, authenticated database, auction/bidding system, electronic commerce treating many coins, and voting protocols to verify a huge number of votes and vehicular communications. Also, the primary examples in cryptographic protocols include multiparty key agreement (KA) and multiparty computation.…”
Section: Introductionmentioning
confidence: 99%
“…Batch verification for an IBS scheme has been suggested to authenticate multiple signatures at a time while still gaining the advantage of the simplified key management procedure. In particular, it is applicable when resource requirements are restricted, because an IBS scheme uses short public keys or identities.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation