Authentication of concast communication

Al-Ibrahim, Mohamed, Ghodosi, Hossein, and Pieprzyk, Josef (2002) Authentication of concast communication. In: Procress in Cryptology: INDOCRYPT 2002. pp. 185-198. From: 3rd International Conference on Cryptology, 16-18 December, 2002, Hyderabad, India.

[img] PDF (Published Version) - Published Version
Restricted to Repository staff only

View at Publisher Website: http://dx.doi.org/10.1007/3-540-36231-2
 
3
8


Abstract

In this paper we tackle the problem of finding an efficient signature verification scheme when the number of signatures is significantly large and the verifier is relatively weak. In particular, we tackle the problem of message authentication in many-to-one communication networks known as concast communication.

The paper presents three signature screening algorithms for a variant of ElGamal-type digital signatures. The cost for these schemes is n applications of hash functions, 2n modular multiplications, and n modular additions plus the verification of one digital signature, where n is the number of signatures.

The paper also presents a solution to the open problem of finding a fast screening signature for non-RSA digital signature schemes.

Item ID: 407
Item Type: Conference Item (Research - E1)
ISBN: 978-3-540-00263-5
Keywords: cryptography, digital signatures, authentication
Date Deposited: 20 Sep 2006
FoR Codes: 08 INFORMATION AND COMPUTING SCIENCES > 0806 Information Systems > 080609 Information Systems Management @ 0%
01 MATHEMATICAL SCIENCES > 0101 Pure Mathematics > 010101 Algebra and Number Theory @ 0%
08 INFORMATION AND COMPUTING SCIENCES > 0806 Information Systems > 080610 Information Systems Organisation @ 0%
Downloads: Total: 8
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page