搜索结果: 1-9 共查到“军事学 batch-verification”相关记录9条 . 查询时间(0.046 秒)
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
Batch verification bilinear maps Groth-Sahai proofs
font style='font-size:12px;'>
2017/8/29
Bilinear groups form the algebraic setting for a multitude of important cryptographic protocols including anonymous credentials, e-cash, e-voting, e-coupon, and loyalty systems. It is typical of such ...
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
digital signatures pairing-based cryptography batch verification automation crypographic compiler
font style='font-size:12px;'>
2013/4/18
As devices everywhere increasingly communicate with each other, many security applications will require low-bandwidth signatures that can be processed quickly. Pairing-based signatures can be very sho...
Security Analysis of Aggregate signature and Batch verification signature schemes
Identity based signature aggregate signatures batch verification
font style='font-size:12px;'>
2009/6/23
An identity based signature scheme allows any pair of users to communicate securely and
to verify each others signatures without exchanging public key certificates. An aggregate signature
scheme is ...
Group Testing and Batch Verification
Group Testing Batch Verification
font style='font-size:12px;'>
2009/6/15
We observe that finding invalid signatures in batches of signatures that fail batch verification
is an instance of the classical group testing problem. We present and compare new sequential
and para...
Practical Short Signature Batch Verification
Practical Short Signature Batch Verification RSA signatures
font style='font-size:12px;'>
2009/6/2
In many applications, it is desirable to work with signatures that are both short, and yet
where many messages from dierent signers be veried very quickly. RSA signatures satisfy the
latter condit...
A New ID-based Signature with Batch Verification
ID-based signatures Batch verifications
font style='font-size:12px;'>
2009/3/27
An identity (ID)-based signature scheme allows any pair of users to com-
municate securely and to verify each other's signatures without exchanging public key
certificates. We have several ID-based ...
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations
Batch verification modular exponentiation sparse exponent Frobenius map
font style='font-size:12px;'>
2009/2/25
Abstract. Modular exponentiation in an abelian group is one of the
most frequently used mathematical primitives in modern cryptography.
Batch verification is to verify many exponentiations simultane...
Attacking LCCC Batch Verification of RSA Signatures
batch verification digital signatures RSA
font style='font-size:12px;'>
2008/11/10
Batch verification of digital signatures is used to improve
the computational complexity when large number of digital signatures
must be verified. Lee at al. [2] proposed a new method to identify ba...
Batch Verification of Short Signatures
Batch Verification Short Signatures
font style='font-size:12px;'>
2008/8/29
With computer networks spreading into a variety of new environments, the need to authenticate
and secure communication grows. Many of these new environments have particular
requirements on the appli...