Security analysis of batch verification on identity-based signature schemes

被引:0
|
作者
Chiang, Han-Fei [1 ]
Yen, Sung-Ming [1 ]
Lin, Hsi-Chung [1 ]
机构
[1] Natl Cent Univ, Dept Comp Sci & Informat Engn, Lab Cryptog & Informat Secur, Jhongli 32001, Taiwan
来源
PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4 | 2007年
关键词
batch verification; digital signature; identity-based cryptography; signature screening;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Batch verification can improve efficiency when the verifier has to verify a great deal of signatures. With the rising interests on pairing-based cryptography, many researches on identity-based signatures have been proposed. Furthermore, some new researches on enhancing performance of verifying identity-based signatures by a batch verification have also been reported. Another possible weaker but faster batch checking of signatures, named as the batch screening, has been considered in the literature. This paper considers the security of recent batch verification schemes, and a new attack on one identity-based signature scheme with batch screening is proposed. Then, we point, out that a previous attack on another identity-based signature scheme with batch screening is inappropriate due to the misunderstanding of the difference between batch screening and verification.
引用
收藏
页码:50 / +
页数:2
相关论文
共 50 条
  • [1] Review on Identity-Based Batch Verification Schemes for Security and Privacy in VANETs
    Eko Fajar Cahyadi
    Cahya Damarjati
    Min-Shiang Hwang
    Journal of Electronic Science and Technology, 2022, 20 (01) : 92 - 110
  • [2] Security Proofs for Identity-Based Identification and Signature Schemes
    Bellare, Mihir
    Namprempre, Chanathip
    Neven, Gregory
    JOURNAL OF CRYPTOLOGY, 2009, 22 (01) : 1 - 61
  • [3] Security Proofs for Identity-Based Identification and Signature Schemes
    Mihir Bellare
    Chanathip Namprempre
    Gregory Neven
    Journal of Cryptology, 2009, 22 : 1 - 61
  • [4] Security proofs for identity-based identification and signature schemes
    Bellare, M
    Namprempre, C
    Neven, G
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 268 - 286
  • [5] On the security of two identity-based signature schemes based on pairings
    Qin, Zhen
    Yuan, Chen
    Wang, Yilei
    Xiong, Hu
    INFORMATION PROCESSING LETTERS, 2016, 116 (06) : 416 - 418
  • [6] New efficient batch verification for an identity-based signature scheme
    Hwang, Jung Yeon
    Choi, Doo Ho
    Cho, Hyunsook
    Song, Boyeon
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) : 2524 - 2535
  • [7] Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs
    Tzeng, Shiang-Feng
    Horng, Shi-Jinn
    Li, Tianrui
    Wang, Xian
    Huang, Po-Hsian
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (04) : 3235 - 3248
  • [8] IBRS: An Efficient Identity-based Batch Verification Scheme for VANETs Based on Ring Signature
    Liu, Feng
    Wang, Qi
    2019 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2019,
  • [9] On the security of an identity-based signature scheme
    Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37):
  • [10] New identity-based ring signature schemes
    Herranz, J
    Sáez, G
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 27 - 39