Lenient/Strict Batch Verification in Several Groups

作者: Fumitaka Hoshino , Masayuki Abe , Tetsutaro Kobayashi

DOI: 10.1007/3-540-45439-X_6

关键词: Elliptic curveModular exponentiationArithmeticCryptographic primitiveComputer sciencePrime (order theory)CryptographyAlgorithm

摘要: Batch verification is a useful tool in verifying large number of cryptographic items all at one time. It especially effective predicates based on modular exponentiation. In some cases, however, the can be incorrect although they pass batch together. Such leniency eliminated by checking domain each item advance. With this mind, we investigate if strict remain more than separate verification. paper, estimate efficiency such several types groups, prime subgroup ZZp with special/random p and subgroups defined elliptic curves over Fp, F2m Fpm, which are often used DL-based primitives. Our analysis concludes that differs greatly depending choice group parameters determined predicate. Furthermore, even show there cases where verification, regardless strictness, loses its computational advantage.

参考文章(16)
Henri Cohen, Atsuko Miyaji, Takatoshi Ono, Efficient Elliptic Curve Exponentiation Using Mixed Coordinates international cryptology conference. pp. 51- 65 ,(1998) , 10.1007/3-540-49649-1_6
Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino, Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic theory and application of cryptographic techniques. pp. 176- 189 ,(1999) , 10.1007/3-540-48910-X_13
Tatsuaki Okamoto, Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes international cryptology conference. pp. 31- 53 ,(1992) , 10.1007/3-540-48071-4_3
Masayuki Abe, Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers theory and application of cryptographic techniques. ,vol. 83, pp. 437- 447 ,(1998) , 10.1007/BFB0054144
David Naccache, David M'RaÏhi, Serge Vaudenay, Dan Raphaeli, Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard — theory and application of cryptographic techniques. pp. 77- 85 ,(1994) , 10.1007/BFB0053426
Masayuki Abe, Fumitaka Hoshino, Remarks on Mix-Network Based on Permutation Networks public key cryptography. pp. 317- 324 ,(2001) , 10.1007/3-540-44586-2_23
Stefan Brands, Untraceable off-line cash in wallet with observers international cryptology conference. pp. 302- 318 ,(1994) , 10.1007/3-540-48329-2_26
Colin Boyd, Chris Pavlovski, Attacking and Repairing Batch Verification Schemes international conference on the theory and application of cryptology and information security. pp. 58- 71 ,(2000) , 10.1007/3-540-44448-3_5
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Masayuki Abe, Mix-Networks on Permutation Networks Advances in Cryptology - ASIACRYPT’99. pp. 258- 273 ,(1999) , 10.1007/978-3-540-48000-6_21