Skip to main content
Top
Published in: Journal of Cryptographic Engineering 4/2014

01-11-2014 | Regular Paper

New algorithms for batch verification of standard ECDSA signatures

Authors: Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer

Published in: Journal of Cryptographic Engineering | Issue 4/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, several algorithms for batch verification of ECDSA signatures are studied. The first of these algorithms is based upon the naive idea of taking square roots in the underlying field. In order to improve the efficiency beyond what can be achieved by the naive algorithm, two new algorithms are proposed which replace square-root computations by symbolic manipulations. Experiments carried out on NIST prime curves demonstrate a maximum speedup of above six over individual verification if all the signatures in the batch belong to the same signer, and a maximum speedup of about two if the signatures in the batch belong to different signers, both achieved by a fast variant of the second symbolic-manipulation algorithm. In terms of security, all the studied algorithms are equivalent to standard ECDSA* batch verification. These algorithms are practical only for small (\({\le }8\)) batch sizes. The algorithms are also ported to the NIST Koblitz curves defined over fields of characteristic 2. This appears to be the first reported study on the batch verification of standard ECDSA signatures.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
1.
go back to reference Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated verification of ECDSA signatures. In: SAC. Lecture Notes in Computer Science, vol. 3897, pp. 307–318. Springer, Berlin (2006) Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated verification of ECDSA signatures. In: SAC. Lecture Notes in Computer Science, vol. 3897, pp. 307–318. Springer, Berlin (2006)
2.
go back to reference Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 1403, pp. 236–250. Springer, Berlin (1998) Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 1403, pp. 236–250. Springer, Berlin (1998)
3.
go back to reference Bernstein, D.J., Doumen, J., Lange, T., Oosterwijk, J.J.: Faster batch forgery identification. In: INDOCRYPT. Lecture Notes in Computer Science, vol. 7668, pp. 454–473. Springer, Berlin (2012) Bernstein, D.J., Doumen, J., Lange, T., Oosterwijk, J.J.: Faster batch forgery identification. In: INDOCRYPT. Lecture Notes in Computer Science, vol. 7668, pp. 454–473. Springer, Berlin (2012)
4.
go back to reference Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: PKC. Lecture Notes in Computer Science, vol. 4450, pp. 442–457. Springer, Berlin (2007) Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: PKC. Lecture Notes in Computer Science, vol. 4450, pp. 442–457. Springer, Berlin (2007)
6.
go back to reference Das, A., Choudhury, D.R., Bhattacharya, D., Rajavelu, S., Shorey, R., Thomas, T.: Authentication schemes for VANETs: a survey. Int. J. Vehicle Inf. Commun. Syst. 3(1), 1–27 (2013) Das, A., Choudhury, D.R., Bhattacharya, D., Rajavelu, S., Shorey, R., Thomas, T.: Authentication schemes for VANETs: a survey. Int. J. Vehicle Inf. Commun. Syst. 3(1), 1–27 (2013)
7.
go back to reference Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (November 1976) Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (November 1976)
8.
go back to reference ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985) ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)
9.
go back to reference Harn, L.: Batch verifying multiple RSA digital signatures. Electron. Lett. 34(12), 1219–1220 (1998)CrossRef Harn, L.: Batch verifying multiple RSA digital signatures. Electron. Lett. 34(12), 1219–1220 (1998)CrossRef
10.
go back to reference Hwang, M.S., Lin, I.C., Hwang, K.F.: Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica 11(1), 15–19 (2000)MathSciNetMATH Hwang, M.S., Lin, I.C., Hwang, K.F.: Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica 11(1), 15–19 (2000)MathSciNetMATH
11.
go back to reference Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). J. Inf. Security 1, 36–63 (2001)CrossRef Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). J. Inf. Security 1, 36–63 (2001)CrossRef
12.
go back to reference Karati, S., Das, A., Roychowdhury, D.: Using randomizers for batch verification of ECDSA signatures. Tech. rep., Cryptology ePrint Archive: Report 2012/582 (2012) Karati, S., Das, A., Roychowdhury, D.: Using randomizers for batch verification of ECDSA signatures. Tech. rep., Cryptology ePrint Archive: Report 2012/582 (2012)
13.
go back to reference Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Some computational aspects of root finding in GF(\(q^m\)). In: ISSAC. Lecture Notes in Computer Science, vol. 358, pp. 259–270. Springer, Berlin (1989) Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Some computational aspects of root finding in GF(\(q^m\)). In: ISSAC. Lecture Notes in Computer Science, vol. 358, pp. 259–270. Springer, Berlin (1989)
14.
go back to reference Naccache, D., M’Raihi, D., Rapheali, D., Vaudenay, S.: Can D.S.A. be improved? Complexity trade-offs with the digital signature standard. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 950, pp. 77–85. Springer, Berlin (1994) Naccache, D., M’Raihi, D., Rapheali, D., Vaudenay, S.: Can D.S.A. be improved? Complexity trade-offs with the digital signature standard. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 950, pp. 77–85. Springer, Berlin (1994)
18.
go back to reference Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATH Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATH
19.
go back to reference Shanks, D.: Five number theoretic algorithms. In: Proceedings of the Second Manitoba Conference on Numerical Mathematics. pp. 51–70 (1973) Shanks, D.: Five number theoretic algorithms. In: Proceedings of the Second Manitoba Conference on Numerical Mathematics. pp. 51–70 (1973)
Metadata
Title
New algorithms for batch verification of standard ECDSA signatures
Authors
Sabyasachi Karati
Abhijit Das
Dipanwita Roychowdhury
Bhargav Bellur
Debojyoti Bhattacharya
Aravind Iyer
Publication date
01-11-2014
Publisher
Springer Berlin Heidelberg
Published in
Journal of Cryptographic Engineering / Issue 4/2014
Print ISSN: 2190-8508
Electronic ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-014-0082-x

Premium Partner