DOI QR코드

DOI QR Code

[Retracted]Improved Digital Signature Algorithm Based on Batch Verification

  • Kim, Hye-jin (Dept. of General Education, Kookmin University)
  • Received : 2021.10.21
  • Accepted : 2021.11.25
  • Published : 2021.11.30

Abstract

This paper proposes an efficient SM2 digital signature. The batch verification algorithm is especially suitable for application scenarios that require verification of a large number of digital signatures such as electronic money. The algorithm does not verify immediately after each signature, but verifies multiple signatures at the same time. Because in the SM2 digital signature verification process, the dot multiplication operation is a very time-consuming operation, the batch verification algorithm significantly shortens the entire verification process by reducing the time-consuming dot multiplication operation in the verification process, and greatly improves the verification efficiency. Experimental data shows that in the case of the same number of messages, the efficiency of the batch verification algorithm is much higher than the efficiency of a single verification algorithm. For example, when the number of signatures reaches about 1 million, a single verification algorithm takes about 1 hour, while a batch verification algorithm only needs 2 seconds.

본 논문은 효율적인 SM2 디지털 서명을 제안한다. 배치 검증 알고리즘은 특히 전자화폐와 같은 다수의 디지털 서명을 검증해야 하는 애플리케이션 시나리오에 적합하다. 이 알고리즘은 각 서명 직후에 확인하지는 않지만 동시에 여러 서명을 확인한다. SM2 디지털 서명 검증 프로세스에서 도트 곱셈 연산은 매우 시간이 많이 걸리는 작업이기 때문에 배치 검증 알고리즘은 검증 과정에서 시간이 많이 걸리는 도트 곱셈 연산을 줄여 전체 검증 과정을 크게 단축하고 검증 효율성을 크게 향상시킨다. 실험 데이터는 동일한 수의 메시지의 경우 배치 검증 알고리즘의 효율성이 단일 검증 알고리즘의 효율성보다 훨씬 더 높다는 것을 보여준다. 예를 들어 서명 수가 약 100만 개에 도달한 경우, 단일 검증 알고리즘 처리 시간은 약 1시간이 걸리는 반면 배치 검증 알고리즘은 2초만 있으면 된다.

Keywords

References

  1. Naccache D., M' Raihi D., Vaudenay S., et al. "Can D.S.A be improved? Complexity trade-offs with the digital signature standard", Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 1994, pp.77-85. DOI: https://doi.org/10.1007/BFb0053426
  2. Jung Hyun Kim, "Proposal for Advanced Attribute-based Encryption in Mobile Cloud Computing", Asia-pacific Journal of Convergent Research Interchange, Vol.1, No.4, pp. 45-51, December 31, 2015. DOI: http://dx.doi.org/10.21742/apjcri.2015.12.07
  3. Pavan Yadav, "Advanced Looping Broadcast Proxy Re-Encryption in Cloud computing", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.1, pp. 21-28, March 31, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.03.04
  4. Jae Yoon Lee, Mounika Durbha, "Customary Broadcast Encryption with Advanced Encryption and Short ciphertexts", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.2, pp. 27-33, June 30, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.06.04
  5. Bhargavi Nadella, "Data Encryption using Geometric Range", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.3, pp. 21-28, September 30, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.09.03
  6. Su Min Shin, Vandana Roy, "Hybrid key-Based Encryption in Cloud Storage", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.3, pp. 29-34, September 30, 2016 DOI: http://dx.doi.org/10.21742/APJCRI.2016.09.04
  7. V. Sujatha, "Auditing of Storage Security on Encryption", Asia-pacific Journal of Convergent Research Interchange, Vol.3, No.2, pp. 1-9, June 30, 2017. DOI: http://dx.doi.org/10.21742/APJCRI.2017.06.01
  8. Harn L, "DSA type secure interactive batch verification protocol", Electronics Letters, Vol.34, No.4, pp.257-258, February 16, 1995 DOI: https://doi.org/10.1049/el:19950203
  9. Hwang M. S., Lee C. C., Tang Y. L., "Two simple batch verifying multiple digital signatures", Proceedings of Information and Communications Security, Xian, China, 2001, pp.233-237. DOI: https://doi.org/10.1007/3-540-45600-7_26
  10. Cheon J. H., Yi J. H., "Fast batch verification of multiple signatures", Proceedings of Public Key Cryptography, Beijing, China, 2007, pp.442-457. DOI: https://doi.org/10.1007/978-3-540-71677-8_29
  11. Bayat M., Barmshoory M., Rahimi M., et al. "A secure authentication scheme for VANETs with batch verification", Wire-less Networks, Vol.21, No.5, pp.1733-1743, December 23, 2014. DOI: https://doi.org/10.1007/s11276-014-0881-0
  12. Chinese Encryption Administration, Public key cryptography algorithm SM2 based on elliptic curves, ISBN 0003-2012, Beijing, March 21, 2012. (in Chinese) WEB: http://www.gmbz.org.cn/upload/2018-07-24/1532401863206085511.pdf
  13. Djebaili K., Melkemi L., "Security and robustness of a modified elgamal encryption scheme", International Journal of Information and Communication Technology, Vol.13, No.3, pp.375-387, September 5, 2018. WEB: https://ur.booksc.eu/dl/75214976/11930b https://doi.org/10.1504/IJICT.2018.10012290
  14. Lim C. H., Lee P. J., "Security of interactive DSA batch verification", Electronics Letters, Vol.30, No.19, pp.1592-1593, September 15, 1994. DOI: https://doi.org/10.1049/el:19941112
  15. Harn L., "Batch verifying multiple DSA-type digital signatures", Electronics Letters, Vol.34, No.9, pp.870-871, April 30, 1998. WEB: http://h.web.umkc.edu/harnl/papers/1998%20J1.pdf https://doi.org/10.1049/el:19980620
  16. Hwang M. S., Lee C. C., "Cryptanalysis of the batch verifying multiple DSA-type digital signature", Pakistan Journal of Applied Sciences, Vol.1, No.3, pp.287-288, September 30, 2001. DOI: https://dx.doi.org/10.3923/jas.2001.287.288
  17. Harn L., "Batch verifying multiple RSA digital signatures", Electronics Letters, Vol.34, No.12, pp.1219-1220, June 11, 1998. DOI: https://doi.org/10.1049/el:19980833
  18. Hwang M. S., Lin I. C., Hwang K. F., "Crypt analysis of the batch verifying multiple RSA digital signatures", Informatica, Vol.11, No.1, pp.15-19, January 31, 2000. WEB: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.3241&rep=rep1&type=pdf
  19. Bao F., Lee C. C., Hwang M. S., "Crypt analysis and improvement on batch verifying multiple RSA digital signatures", Applied Mathematics and Computation, Vol.172, No.2, pp.1195-1200, January 15, 2006. DOI: https://doi.org/10.1016/j.amc.2005.03.016
  20. Kittur A. S., Jain A., Pais A. R., "Fast verification of digital signatures in IoT", Proceedigns of the International Symposium on Security in Computing and Communication, Manipal, India, 2017, pp.16-27. DOI: https://doi.org/10.1007/978-981-10-6898-0_2
  21. Johnson D., Menezes A., "The elliptic curve digital signature algorithm (ECDSA)", International Journal on Information Security, Vol.1, No.1, pp.36-63, January 31, 2001. DOI: https://doi.org/10.1007/s102070100002
  22. Antipa A., Brown D., Gallant R., et al. "Accelerated verification of ECDSA signatures", Proceedings of the International Workshop on Selected Areas in Cryptography, Kingston, ON, Canada, 2005, pp.307-318. DOI: https://doi.org/10.1007/11693383_21
  23. Bernstein D. J., Doumen J., Lange T, et al. "Faster batch forgery identification", Proceedings of International Conference on Cryptology in India, Kolkata, India, 2012, pp.454-473. DOI: https://doi.org/10.1007/978-3-642-34931-7_26
  24. Karati S., Das A., Roychowdhury D, et al. "New algorithms for batch verification of standard ECDSA signatures", Journal of Cryptographic Engineering, Vol.4, No.4, pp.237-258. November 30, 2014. DOI: https://doi.org/10.1007/s13389-014-0082-x
  25. Kittur A. S., Pais A. R. "A new batch verifications scheme for ECDSA* signatures", Sadhana, Vol.44, Article No.157, pp.157-169, June 7, 2019. DOI: https://doi.org/10.1007/s12046-019-1142-9
  26. Kui-hwa Park, "Impact of Digital Convergence Technology on the Logistics Value Chain", Asia-pacific Journal of Convergent Research Interchange, Vol.7, No.1, pp. 33-48, January 31, 2021. DOI: http://dx.doi.org/10.47116/apjcri.2021.01.04
  27. Yuan Lin, "Research on Interactively Digital Display for Cultural Heritage- Discovering the Hall of Mental Cultivation: A Digital Experience Exhibition", Asia-pacific Journal of Convergent Research Interchange, Vol.6, No.8, pp. 51-67, August 31, 2020. DOI: http://dx.doi.org/10.47116/apjcri.2020.08.06
  28. Sangbong Nam, Donoung Lee, "Developing Digital Musical Instrument, mPoi, by Taking Advantage of Sensor Interfaces: Focused on the Multimedia Music Piece, "Jwibul"", Asia-pacific Journal of Convergent Research Interchange, pp. 11-19, Vol.6, No.7, July 31, 2020. DOI: http://dx.doi.org/10.47116/apjcri.2020.07.02
  29. K. Asish vardhan, "Some Studies on Digital Image Segmentation Techniques", Asia-pacific Journal of Convergent Research Interchange, Vol.5, No.1, pp. 77-89, March 31, 2019. DOI: http://dx.doi.org/10.21742/apjcri.2019.03.08
  30. Byeong-Hyun Min, SiChul Kim, "Study on Growth Strategies of the Magazine Industry in the Digital Platform", Asia-pacific Journal of Convergent Research Interchange, pp. 65-72, Vol.3, No.4, December 31, 2017. DOI: http://dx.doi.org/10.14257/apjcri.2017.12.06.