Skip to main content
Erschienen in: Journal of Cryptographic Engineering 4/2014

01.11.2014 | Regular Paper

New algorithms for batch verification of standard ECDSA signatures

verfasst von: Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur, Debojyoti Bhattacharya, Aravind Iyer

Erschienen in: Journal of Cryptographic Engineering | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, several algorithms for batch verification of ECDSA signatures are studied. The first of these algorithms is based upon the naive idea of taking square roots in the underlying field. In order to improve the efficiency beyond what can be achieved by the naive algorithm, two new algorithms are proposed which replace square-root computations by symbolic manipulations. Experiments carried out on NIST prime curves demonstrate a maximum speedup of above six over individual verification if all the signatures in the batch belong to the same signer, and a maximum speedup of about two if the signatures in the batch belong to different signers, both achieved by a fast variant of the second symbolic-manipulation algorithm. In terms of security, all the studied algorithms are equivalent to standard ECDSA* batch verification. These algorithms are practical only for small (\({\le }8\)) batch sizes. The algorithms are also ported to the NIST Koblitz curves defined over fields of characteristic 2. This appears to be the first reported study on the batch verification of standard ECDSA signatures.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated verification of ECDSA signatures. In: SAC. Lecture Notes in Computer Science, vol. 3897, pp. 307–318. Springer, Berlin (2006) Antipa, A., Brown, D., Gallant, R., Lambert, R., Struik, R., Vanstone, S.: Accelerated verification of ECDSA signatures. In: SAC. Lecture Notes in Computer Science, vol. 3897, pp. 307–318. Springer, Berlin (2006)
2.
Zurück zum Zitat Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 1403, pp. 236–250. Springer, Berlin (1998) Bellare, M., Garay, J.A., Rabin, T.: Fast batch verification for modular exponentiation and digital signatures. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 1403, pp. 236–250. Springer, Berlin (1998)
3.
Zurück zum Zitat Bernstein, D.J., Doumen, J., Lange, T., Oosterwijk, J.J.: Faster batch forgery identification. In: INDOCRYPT. Lecture Notes in Computer Science, vol. 7668, pp. 454–473. Springer, Berlin (2012) Bernstein, D.J., Doumen, J., Lange, T., Oosterwijk, J.J.: Faster batch forgery identification. In: INDOCRYPT. Lecture Notes in Computer Science, vol. 7668, pp. 454–473. Springer, Berlin (2012)
4.
Zurück zum Zitat Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: PKC. Lecture Notes in Computer Science, vol. 4450, pp. 442–457. Springer, Berlin (2007) Cheon, J.H., Yi, J.H.: Fast batch verification of multiple signatures. In: PKC. Lecture Notes in Computer Science, vol. 4450, pp. 442–457. Springer, Berlin (2007)
6.
Zurück zum Zitat Das, A., Choudhury, D.R., Bhattacharya, D., Rajavelu, S., Shorey, R., Thomas, T.: Authentication schemes for VANETs: a survey. Int. J. Vehicle Inf. Commun. Syst. 3(1), 1–27 (2013) Das, A., Choudhury, D.R., Bhattacharya, D., Rajavelu, S., Shorey, R., Thomas, T.: Authentication schemes for VANETs: a survey. Int. J. Vehicle Inf. Commun. Syst. 3(1), 1–27 (2013)
7.
Zurück zum Zitat Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (November 1976) Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (November 1976)
8.
Zurück zum Zitat ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985) ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985)
9.
Zurück zum Zitat Harn, L.: Batch verifying multiple RSA digital signatures. Electron. Lett. 34(12), 1219–1220 (1998)CrossRef Harn, L.: Batch verifying multiple RSA digital signatures. Electron. Lett. 34(12), 1219–1220 (1998)CrossRef
10.
Zurück zum Zitat Hwang, M.S., Lin, I.C., Hwang, K.F.: Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica 11(1), 15–19 (2000)MathSciNetMATH Hwang, M.S., Lin, I.C., Hwang, K.F.: Cryptanalysis of the batch verifying multiple RSA digital signatures. Informatica 11(1), 15–19 (2000)MathSciNetMATH
11.
Zurück zum Zitat Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). J. Inf. Security 1, 36–63 (2001)CrossRef Johnson, D., Menezes, A.: The elliptic curve digital signature algorithm (ECDSA). J. Inf. Security 1, 36–63 (2001)CrossRef
12.
Zurück zum Zitat Karati, S., Das, A., Roychowdhury, D.: Using randomizers for batch verification of ECDSA signatures. Tech. rep., Cryptology ePrint Archive: Report 2012/582 (2012) Karati, S., Das, A., Roychowdhury, D.: Using randomizers for batch verification of ECDSA signatures. Tech. rep., Cryptology ePrint Archive: Report 2012/582 (2012)
13.
Zurück zum Zitat Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Some computational aspects of root finding in GF(\(q^m\)). In: ISSAC. Lecture Notes in Computer Science, vol. 358, pp. 259–270. Springer, Berlin (1989) Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Some computational aspects of root finding in GF(\(q^m\)). In: ISSAC. Lecture Notes in Computer Science, vol. 358, pp. 259–270. Springer, Berlin (1989)
14.
Zurück zum Zitat Naccache, D., M’Raihi, D., Rapheali, D., Vaudenay, S.: Can D.S.A. be improved? Complexity trade-offs with the digital signature standard. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 950, pp. 77–85. Springer, Berlin (1994) Naccache, D., M’Raihi, D., Rapheali, D., Vaudenay, S.: Can D.S.A. be improved? Complexity trade-offs with the digital signature standard. In: EUROCRYPT. Lecture Notes in Computer Science, vol. 950, pp. 77–85. Springer, Berlin (1994)
18.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATH Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21(2), 120–126 (1978)MathSciNetCrossRefMATH
19.
Zurück zum Zitat Shanks, D.: Five number theoretic algorithms. In: Proceedings of the Second Manitoba Conference on Numerical Mathematics. pp. 51–70 (1973) Shanks, D.: Five number theoretic algorithms. In: Proceedings of the Second Manitoba Conference on Numerical Mathematics. pp. 51–70 (1973)
Metadaten
Titel
New algorithms for batch verification of standard ECDSA signatures
verfasst von
Sabyasachi Karati
Abhijit Das
Dipanwita Roychowdhury
Bhargav Bellur
Debojyoti Bhattacharya
Aravind Iyer
Publikationsdatum
01.11.2014
Verlag
Springer Berlin Heidelberg
Erschienen in
Journal of Cryptographic Engineering / Ausgabe 4/2014
Print ISSN: 2190-8508
Elektronische ISSN: 2190-8516
DOI
https://doi.org/10.1007/s13389-014-0082-x

Premium Partner