Batch verification suitable for efficiently verifying a limited number of signatures

Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in particular, batch verification is especially appropriate for systems which are required to verify a large amount of signatures. However, in addition to the above requirement, several types of systems might also require verifying a limited number of digital signatures more and more efficiently in real-time. For this purpose, to improve the efficiency of verifying a limited number of signatures is presumably an important matter. This paper deals with the second requirement and proposes an efficient batch verification technique suitable for verifying a limited number of signatures in real-time. Our method can only be applied to elliptic curve based signatures, and uses one of the two special families of elliptic curves.

Original languageEnglish
Title of host publicationInformation Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers
Pages425-440
Number of pages16
DOIs
Publication statusPublished - Apr 15 2013
Event15th International Conference on Information Security and Cryptology, ICISC 2012 - Seoul, Korea, Republic of
Duration: Nov 28 2012Nov 30 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7839 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other15th International Conference on Information Security and Cryptology, ICISC 2012
CountryKorea, Republic of
CitySeoul
Period11/28/1211/30/12

Fingerprint

Batch
Signature
Electronic document identification systems
Digital Signature
Elliptic Curves
Real-time
Requirements
Computational Cost
Verify
Costs

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Hakuta, K., Katoh, Y., Sato, H., & Takagi, T. (2013). Batch verification suitable for efficiently verifying a limited number of signatures. In Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers (pp. 425-440). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7839 LNCS). https://doi.org/10.1007/978-3-642-37682-5_30

Batch verification suitable for efficiently verifying a limited number of signatures. / Hakuta, Keisuke; Katoh, Yosuke; Sato, Hisayoshi; Takagi, Tsuyoshi.

Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers. 2013. p. 425-440 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7839 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hakuta, K, Katoh, Y, Sato, H & Takagi, T 2013, Batch verification suitable for efficiently verifying a limited number of signatures. in Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7839 LNCS, pp. 425-440, 15th International Conference on Information Security and Cryptology, ICISC 2012, Seoul, Korea, Republic of, 11/28/12. https://doi.org/10.1007/978-3-642-37682-5_30
Hakuta K, Katoh Y, Sato H, Takagi T. Batch verification suitable for efficiently verifying a limited number of signatures. In Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers. 2013. p. 425-440. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-37682-5_30
Hakuta, Keisuke ; Katoh, Yosuke ; Sato, Hisayoshi ; Takagi, Tsuyoshi. / Batch verification suitable for efficiently verifying a limited number of signatures. Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers. 2013. pp. 425-440 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{735f7d2f2d90458bb75efd0c1c5d9a12,
title = "Batch verification suitable for efficiently verifying a limited number of signatures",
abstract = "Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in particular, batch verification is especially appropriate for systems which are required to verify a large amount of signatures. However, in addition to the above requirement, several types of systems might also require verifying a limited number of digital signatures more and more efficiently in real-time. For this purpose, to improve the efficiency of verifying a limited number of signatures is presumably an important matter. This paper deals with the second requirement and proposes an efficient batch verification technique suitable for verifying a limited number of signatures in real-time. Our method can only be applied to elliptic curve based signatures, and uses one of the two special families of elliptic curves.",
author = "Keisuke Hakuta and Yosuke Katoh and Hisayoshi Sato and Tsuyoshi Takagi",
year = "2013",
month = "4",
day = "15",
doi = "10.1007/978-3-642-37682-5_30",
language = "English",
isbn = "9783642376818",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "425--440",
booktitle = "Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers",

}

TY - GEN

T1 - Batch verification suitable for efficiently verifying a limited number of signatures

AU - Hakuta, Keisuke

AU - Katoh, Yosuke

AU - Sato, Hisayoshi

AU - Takagi, Tsuyoshi

PY - 2013/4/15

Y1 - 2013/4/15

N2 - Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in particular, batch verification is especially appropriate for systems which are required to verify a large amount of signatures. However, in addition to the above requirement, several types of systems might also require verifying a limited number of digital signatures more and more efficiently in real-time. For this purpose, to improve the efficiency of verifying a limited number of signatures is presumably an important matter. This paper deals with the second requirement and proposes an efficient batch verification technique suitable for verifying a limited number of signatures in real-time. Our method can only be applied to elliptic curve based signatures, and uses one of the two special families of elliptic curves.

AB - Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in particular, batch verification is especially appropriate for systems which are required to verify a large amount of signatures. However, in addition to the above requirement, several types of systems might also require verifying a limited number of digital signatures more and more efficiently in real-time. For this purpose, to improve the efficiency of verifying a limited number of signatures is presumably an important matter. This paper deals with the second requirement and proposes an efficient batch verification technique suitable for verifying a limited number of signatures in real-time. Our method can only be applied to elliptic curve based signatures, and uses one of the two special families of elliptic curves.

UR - http://www.scopus.com/inward/record.url?scp=84875996936&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84875996936&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-37682-5_30

DO - 10.1007/978-3-642-37682-5_30

M3 - Conference contribution

SN - 9783642376818

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 425

EP - 440

BT - Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers

ER -