[[abstract]]In this paper, the authors have introduced three authentication methods including RSA, Harn's, and their improved scheme. They also introduce the performance of these three schemes and some illegal signature detections in their scheme. According to the experiment result shows, the performance of Harn's scheme is the best when there does not have any signature-verification faults and their scheme is not suitable for batch verification when the messages amount is small. However, there are two kinds of attacks that can cheat Harn's scheme and their scheme cannot find out where the signature-verification fault is located if the batch verification fails. Therefore, their improved scheme could resist the weakness of Harn's and quickly...
In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures ef...
We propose a strongly secure certificateless signature scheme supporting batch verification, which m...
Abstract. The paper addresses the problem of bad signature identi-cation in batch verication of digi...
The concept of batch verifying multiple RSA digital signatures is to find a method that multiple dig...
[[abstract]]Invalid signatures produced by some adversaries may pose a severe challenge to the recip...
Abstract. Batch verification can provide large computational savings when several signatures, or oth...
[[abstract]]Recently, Hwang et al. proposed a simple batch verifying multiple RSA digital signatures...
The paper addresses the problem of bad signature identification in batch verification of digital sig...
Batch verification of digital signatures is used to improve the computational complexity when large ...
In Eurocrypt 2007, Camenisch, Hohenberger and Pedersen introduced the notion of multi-signer batch v...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
[[abstract]]In order to reduce the multiple-signature verification time quite, some investigations o...
Batch signature verification detects whether a batch of signatures contains any forgeries. Batch for...
[[abstract]]In this article, we proposed a batch verification scheme for multiple proxy signatures t...
As devices everywhere increasingly communicate with each other, many security applications will requ...
In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures ef...
We propose a strongly secure certificateless signature scheme supporting batch verification, which m...
Abstract. The paper addresses the problem of bad signature identi-cation in batch verication of digi...
The concept of batch verifying multiple RSA digital signatures is to find a method that multiple dig...
[[abstract]]Invalid signatures produced by some adversaries may pose a severe challenge to the recip...
Abstract. Batch verification can provide large computational savings when several signatures, or oth...
[[abstract]]Recently, Hwang et al. proposed a simple batch verifying multiple RSA digital signatures...
The paper addresses the problem of bad signature identification in batch verification of digital sig...
Batch verification of digital signatures is used to improve the computational complexity when large ...
In Eurocrypt 2007, Camenisch, Hohenberger and Pedersen introduced the notion of multi-signer batch v...
With computer networks spreading into a variety of new environments, the need to au-thenticate and s...
[[abstract]]In order to reduce the multiple-signature verification time quite, some investigations o...
Batch signature verification detects whether a batch of signatures contains any forgeries. Batch for...
[[abstract]]In this article, we proposed a batch verification scheme for multiple proxy signatures t...
As devices everywhere increasingly communicate with each other, many security applications will requ...
In VANET (Vehicular Ad hoc NETwork), vehicles can efficiently verify a large number of signatures ef...
We propose a strongly secure certificateless signature scheme supporting batch verification, which m...
Abstract. The paper addresses the problem of bad signature identi-cation in batch verication of digi...