Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
スポンサーリンク
概要
- 論文の詳細を見る
Previously proposed batch signature schemes do not allow a signer to generate a signature immediately for sequentially asked signing queries. In this letter, we propose flexible batch signatures which do not need any waiting period and have very light computational overhead. Therefore our schemes are well suited for low power devices.
- (社)電子情報通信学会の論文
- 2008-05-01
著者
-
Park Young‐ho
Sejong Cyber Univ. Seoul Kor
-
Park Young-ho
The Faculty Of The Department Of Information Security Sejong Cyber University
-
LIM Jongin
Graduate School of Information Management and Security (CIST)
-
Park Young-ho
Dept. Of Information Security Systems Sejong Cyber University
-
YOUN Taek-Young
Graduate School of Information Management and Security, Korea University
-
PARK Young-Ho
Information Security Systems, Sejong Cyber University
-
KWON Taekyoung
School of Computer Engineering, Sejong University
-
KWON Soonhak
Dept. of Mathematics, Sungkyunkwan University
-
Youn Taek‐young
Graduate School Of Information Management And Security Korea University
-
Lim Jongin
Graduate School Of Information Management And Security Korea University
-
Kwon Soonhak
Dept. Of Mathematics Sungkyunkwan University
-
Kwon Taekyoung
School Of Computer Engineering Sejong University
-
Kwon Taekyoung
The Faculty Of The School Of Computer Engineering Sejong University
-
Youn Taek-young
Graduate School Of Information Management And Security Korea University
関連論文
- Impersonation Attack on a Strong ID-Based Key Distribution
- Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
- An Efficient Signature Scheme with Fast Online Signing
- Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
- New Hardware Architecture for Multiplication over GF(2^m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
- Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure(Discrete Mathematics and Its Applications)
- Partial Key Exposure Attacks on Unbalanced RSA with the CRT (Information Security)
- Security Vulnerability of ID-Based Key Sharing Schemes