A BATCH VERIFYING AND DETECTING THE ILLEGAL SIGNATURES

The concept of batch verifying multiple RSA digital signatures is to find a method that multiple digital signatures can be verified simultaneously in only one exponential operation time. In this article, we proposed a new batch verifying multiple RSA digital signatures scheme. The main contribution of the proposed scheme is that it can easily discover where the signature-verification fault is located without re-verifying all individual signatures separately.

[1]  Min-Shiang Hwang,et al.  AN ONLINE BIOMETRICS-BASED SECRET SHARING SCHEME FOR MULTIPARTY CRYPTOSYSTEM USING SMART CARDS , 2009 .

[2]  Cheng-Chi Lee,et al.  Research Issues and Challenges for Multiple Digital Signatures , 2005, Int. J. Netw. Secur..

[3]  Chun-Ta Li,et al.  Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments , 2008, Comput. Commun..

[4]  Yen-Ping Chu,et al.  An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .

[5]  Tony Thomas,et al.  A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting , 2008, Int. J. Netw. Secur..

[6]  Lein Harn,et al.  Batch verifying multiple RSA digital signatures , 1998 .

[7]  Chun-Ta Li,et al.  An electronic voting protocol with deniable authentication for mobile ad hoc networks , 2008, Comput. Commun..

[8]  Zhenfu Cao,et al.  On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification , 2007, Int. J. Netw. Secur..

[9]  Eric Jui-Lin Lu,et al.  Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .

[10]  Fangguo Zhang,et al.  A New Type of Designated Confirmer Signatures for a Group of Individuals , 2008, Int. J. Netw. Secur..

[11]  Martin Stanek Attacking LCCC Batch Verification of RSA Signatures , 2008, Int. J. Netw. Secur..

[12]  Cheng-Chi Lee,et al.  On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs , 2010, ICCSA.

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Chun-Ta Li,et al.  Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks , 2008, Comput. Syst. Sci. Eng..

[15]  Min-Shiang Hwang,et al.  A NON-REPUDIABLE MULTI-PROXY MULTI-SIGNATURE SCHEME , 2009 .

[16]  Maged Hamada Ibrahim Resisting Traitors in Linkable Democratic Group Signatures , 2009, Int. J. Netw. Secur..

[17]  Chun-Ta Li An Efficient and Secure Communication Scheme for Trusted Computing Environments , 2009 .

[18]  Chun-Ta Li,et al.  A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..

[19]  Chun-Ta Li,et al.  An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..

[20]  Chun-Ta Li,et al.  Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks , 2009, Int. J. Netw. Secur..

[21]  Min-Shiang Hwang,et al.  Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures , 2000, Informatica.

[22]  L. Harn Batch verifying multiple DSA-type digital signatures , 1998 .