World Scientific
  • Search
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×
Our website is made possible by displaying certain online content using javascript.
In order to view the full content, please disable your ad blocker or whitelist our website www.worldscientific.com.

System Upgrade on Tue, Oct 25th, 2022 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at [email protected] for any enquiries.

A BATCH VERIFICATION FOR MULTIPLE PROXY SIGNATURE

    In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not verify each individual proxy signature separately, but also secure because it can detect forged multiple proxy signatures without failure.

    References

    • F. Bao, C. C. Lee, and M. S. Hwang, Cryptanalysis and improvement on batch verifying multiple RSA digital signatures, Applied Mathematics and Computation, 172 (2006) 1195–1200. 27 (1983) 400–433 . Google Scholar
    • M. L. Das, A. Saxena and D. B. Phatak, International Journal of Network Security 4, 312 (2007). Google Scholar
    • M. L. Das, A. Saxena and D. B. Phatak, International Journal of Network Security 9, 264 (2009). Google Scholar
    • L. Harn, Electronics Letters 34, 870 (1998), DOI: 10.1049/el:19980620. Crossref, ISIGoogle Scholar
    • L. Harn, Electronics Letters 34, 1219 (1998), DOI: 10.1049/el:19980833. Crossref, ISIGoogle Scholar
    • L. Harn and Y. Xu, Electronics Letters 30, 2025 (1994), DOI: 10.1049/el:19941398. Crossref, ISIGoogle Scholar
    • M. S. Hwang, I. C. Lin and Eric J. L. Lu, International Journal of Informatica 11, 1 (2000). ISIGoogle Scholar
    • Min-Shiang Hwang, Cheng-Chi Lee and Eric Jui-Lin Lu, Pakistan Journal of Applied Sciences 1, 287 (2001). Google Scholar
    • Min-Shiang Hwang, Cheng-Chi Lee and Yuan-Liang Tang, Two simple batch verifying multiple digital signatures, Proc. of ICICS'2001, LNCS 2229 pp. 233–237. Google Scholar
    • Min-Shiang Hwang, Iuon-Chung Lin and Kuo-Feng Hwang, Informatica 11, 15 (2000). Google Scholar
    • K. Kim, I. Yie and S. Lim, International Journal of Network Security 9, 8 (2009). Google Scholar
    • S. Kim, S. Park and D. Won, Proxy signatures, revisited, Proc. of ICICS'97, LNCS 1334 pp. 223–232. Google Scholar
    • N. Y. Lee, T. Hwang and C. H. Wang, On Zhang's nonrepudiable proxy signature schemes, ACISP'98, LNCS 1438 pp. 415–422. Google Scholar
    • Eric Jui-Lin Lu and Cheng-Jian Huang, International Journal of Network Security 2, 43 (2006). Google Scholar
    • M. Mambo, K. Usuda and E. Okamoto, IEICE Trans. Fundamentals E79-A, 1338 (1996). Google Scholar
    • M. Mambo, K. Usuda and E. Okamoto, Proxy signatures for delegating signing operation, Proc. Third ACM Conf. on Computer and Communications Security pp. 48–57. Google Scholar
    • D. Naccacheet al., Can DSA be improved: Complexity trade-offs with the digital signature standard, Advances in Cryptology, Eurocrypt'94 pp. 85–94. Google Scholar
    • Z. Shao, Computer Networks 37, 383 (2001), DOI: 10.1016/S1389-1286(01)00220-1. Crossref, ISIGoogle Scholar
    • Z. Shao, Information Processing Letters 85, 137 (2003), DOI: 10.1016/S0020-0190(02)00367-8. Crossref, ISIGoogle Scholar
    • H. M. Sun, On proxy (multi-) signature schemes, 2000 International Computer Symposium pp. 65–72. Google Scholar
    • Zuo-Wen Tan, International Journal of Network Security 7, 175 (2008). ISIGoogle Scholar
    • Shiang-Feng Tzeng, Chen-Ying Yang and Min-Shiang Hwang, A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification, Proceeding of 12th National Conference on Information Security, R.O.C. pp. 285–292. Google Scholar
    • G. K. Verma, International Journal of Network Security 9, 214 (2009). Google Scholar
    • Qi Xie and Xiu-Yuan Yu, International Journal of Network Security 3, 18 (2006), DOI: 10.5815/ijcnis.2011.04.03. CrossrefGoogle Scholar
    • Q. S. Xue and Z. F. Cao, Journal of Computational and Applied Mathematics 195, 229 (2006). Crossref, ISIGoogle Scholar
    • L. Yi, G. Bai and G. Xiao, Electronics Letters 36, 527 (2000), DOI: 10.1049/el:20000422. Crossref, ISIGoogle Scholar
    • K. Zhang, Threshold proxy signature schemes, 1997 Information Security Workshop pp. 191–197. Google Scholar