TY - GEN
T1 - Batch verification suitable for efficiently verifying a limited number of signatures
AU - Hakuta, Keisuke
AU - Katoh, Yosuke
AU - Sato, Hisayoshi
AU - Takagi, Tsuyoshi
PY - 2013/4/15
Y1 - 2013/4/15
N2 - Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in particular, batch verification is especially appropriate for systems which are required to verify a large amount of signatures. However, in addition to the above requirement, several types of systems might also require verifying a limited number of digital signatures more and more efficiently in real-time. For this purpose, to improve the efficiency of verifying a limited number of signatures is presumably an important matter. This paper deals with the second requirement and proposes an efficient batch verification technique suitable for verifying a limited number of signatures in real-time. Our method can only be applied to elliptic curve based signatures, and uses one of the two special families of elliptic curves.
AB - Batch verification is a method for verifying digital signatures at once. Batch verification can reduce the computational cost compared to that of verifying each signature one by one, and in particular, batch verification is especially appropriate for systems which are required to verify a large amount of signatures. However, in addition to the above requirement, several types of systems might also require verifying a limited number of digital signatures more and more efficiently in real-time. For this purpose, to improve the efficiency of verifying a limited number of signatures is presumably an important matter. This paper deals with the second requirement and proposes an efficient batch verification technique suitable for verifying a limited number of signatures in real-time. Our method can only be applied to elliptic curve based signatures, and uses one of the two special families of elliptic curves.
UR - http://www.scopus.com/inward/record.url?scp=84875996936&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84875996936&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-37682-5_30
DO - 10.1007/978-3-642-37682-5_30
M3 - Conference contribution
AN - SCOPUS:84875996936
SN - 9783642376818
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 425
EP - 440
BT - Information Security and Cryptology, ICISC 2012 - 15th International Conference, Revised Selected Papers
T2 - 15th International Conference on Information Security and Cryptology, ICISC 2012
Y2 - 28 November 2012 through 30 November 2012
ER -