A BATCH VERIFICATION FOR MULTIPLE PROXY SIGNATURE
Abstract
In this article, we proposed a batch verification scheme for multiple proxy signatures to reduce the proxy signature verification time. The proposed scheme is not only efficient because it does not verify each individual proxy signature separately, but also secure because it can detect forged multiple proxy signatures without failure.
References
- F. Bao, C. C. Lee, and M. S. Hwang, Cryptanalysis and improvement on batch verifying multiple RSA digital signatures, Applied Mathematics and Computation, 172 (2006) 1195–1200. 27 (1983) 400–433 . Google Scholar
- International Journal of Network Security 4, 312 (2007). Google Scholar
- International Journal of Network Security 9, 264 (2009). Google Scholar
- Electronics Letters 34, 870 (1998), DOI: 10.1049/el:19980620. Crossref, ISI, Google Scholar
- Electronics Letters 34, 1219 (1998), DOI: 10.1049/el:19980833. Crossref, ISI, Google Scholar
- Electronics Letters 30, 2025 (1994), DOI: 10.1049/el:19941398. Crossref, ISI, Google Scholar
- International Journal of Informatica 11, 1 (2000). ISI, Google Scholar
- Pakistan Journal of Applied Sciences 1, 287 (2001). Google Scholar
Min-Shiang Hwang , Cheng-Chi Lee and Yuan-Liang Tang , Two simple batch verifying multiple digital signatures, Proc. of ICICS'2001,LNCS 2229 pp. 233–237. Google Scholar- Informatica 11, 15 (2000). Google Scholar
- International Journal of Network Security 9, 8 (2009). Google Scholar
S. Kim , S. Park and D. Won , Proxy signatures, revisited, Proc. of ICICS'97,LNCS 1334 pp. 223–232. Google ScholarN. Y. Lee , T. Hwang and C. H. Wang , On Zhang's nonrepudiable proxy signature schemes, ACISP'98,LNCS 1438 pp. 415–422. Google Scholar- International Journal of Network Security 2, 43 (2006). Google Scholar
- IEICE Trans. Fundamentals E79-A, 1338 (1996). Google Scholar
M. Mambo , K. Usuda and E. Okamoto , Proxy signatures for delegating signing operation, Proc. Third ACM Conf. on Computer and Communications Security pp. 48–57. Google ScholarD. Naccache , Can DSA be improved: Complexity trade-offs with the digital signature standard, Advances in Cryptology, Eurocrypt'94 pp. 85–94. Google Scholar- Computer Networks 37, 383 (2001), DOI: 10.1016/S1389-1286(01)00220-1. Crossref, ISI, Google Scholar
- Information Processing Letters 85, 137 (2003), DOI: 10.1016/S0020-0190(02)00367-8. Crossref, ISI, Google Scholar
H. M. Sun , On proxy (multi-) signature schemes, 2000 International Computer Symposium pp. 65–72. Google Scholar- International Journal of Network Security 7, 175 (2008). ISI, Google Scholar
Shiang-Feng Tzeng , Chen-Ying Yang and Min-Shiang Hwang , A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification, Proceeding of 12th National Conference on Information Security, R.O.C. pp. 285–292. Google Scholar- International Journal of Network Security 9, 214 (2009). Google Scholar
- International Journal of Network Security 3, 18 (2006), DOI: 10.5815/ijcnis.2011.04.03. Crossref, Google Scholar
- Journal of Computational and Applied Mathematics 195, 229 (2006). Crossref, ISI, Google Scholar
- Electronics Letters 36, 527 (2000), DOI: 10.1049/el:20000422. Crossref, ISI, Google Scholar
K. Zhang , Threshold proxy signature schemes, 1997 Information Security Workshop pp. 191–197. Google Scholar


