Browse > Article
http://dx.doi.org/10.9708/jksci.2021.26.11.111

[Retracted]Improved Digital Signature Algorithm Based on Batch Verification  

Kim, Hye-jin (Dept. of General Education, Kookmin University)
Abstract
This paper proposes an efficient SM2 digital signature. The batch verification algorithm is especially suitable for application scenarios that require verification of a large number of digital signatures such as electronic money. The algorithm does not verify immediately after each signature, but verifies multiple signatures at the same time. Because in the SM2 digital signature verification process, the dot multiplication operation is a very time-consuming operation, the batch verification algorithm significantly shortens the entire verification process by reducing the time-consuming dot multiplication operation in the verification process, and greatly improves the verification efficiency. Experimental data shows that in the case of the same number of messages, the efficiency of the batch verification algorithm is much higher than the efficiency of a single verification algorithm. For example, when the number of signatures reaches about 1 million, a single verification algorithm takes about 1 hour, while a batch verification algorithm only needs 2 seconds.
Keywords
Digital; Signature; Batch verification; SM2; Authenticity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 V. Sujatha, "Auditing of Storage Security on Encryption", Asia-pacific Journal of Convergent Research Interchange, Vol.3, No.2, pp. 1-9, June 30, 2017. DOI: http://dx.doi.org/10.21742/APJCRI.2017.06.01   DOI
2 Byeong-Hyun Min, SiChul Kim, "Study on Growth Strategies of the Magazine Industry in the Digital Platform", Asia-pacific Journal of Convergent Research Interchange, pp. 65-72, Vol.3, No.4, December 31, 2017. DOI: http://dx.doi.org/10.14257/apjcri.2017.12.06.   DOI
3 Cheon J. H., Yi J. H., "Fast batch verification of multiple signatures", Proceedings of Public Key Cryptography, Beijing, China, 2007, pp.442-457. DOI: https://doi.org/10.1007/978-3-540-71677-8_29   DOI
4 Bayat M., Barmshoory M., Rahimi M., et al. "A secure authentication scheme for VANETs with batch verification", Wire-less Networks, Vol.21, No.5, pp.1733-1743, December 23, 2014. DOI: https://doi.org/10.1007/s11276-014-0881-0   DOI
5 Chinese Encryption Administration, Public key cryptography algorithm SM2 based on elliptic curves, ISBN 0003-2012, Beijing, March 21, 2012. (in Chinese) WEB: http://www.gmbz.org.cn/upload/2018-07-24/1532401863206085511.pdf
6 Djebaili K., Melkemi L., "Security and robustness of a modified elgamal encryption scheme", International Journal of Information and Communication Technology, Vol.13, No.3, pp.375-387, September 5, 2018. WEB: https://ur.booksc.eu/dl/75214976/11930b   DOI
7 Harn L., "Batch verifying multiple DSA-type digital signatures", Electronics Letters, Vol.34, No.9, pp.870-871, April 30, 1998. WEB: http://h.web.umkc.edu/harnl/papers/1998%20J1.pdf   DOI
8 Hwang M. S., Lee C. C., "Cryptanalysis of the batch verifying multiple DSA-type digital signature", Pakistan Journal of Applied Sciences, Vol.1, No.3, pp.287-288, September 30, 2001. DOI: https://dx.doi.org/10.3923/jas.2001.287.288   DOI
9 Harn L., "Batch verifying multiple RSA digital signatures", Electronics Letters, Vol.34, No.12, pp.1219-1220, June 11, 1998. DOI: https://doi.org/10.1049/el:19980833   DOI
10 Kittur A. S., Jain A., Pais A. R., "Fast verification of digital signatures in IoT", Proceedigns of the International Symposium on Security in Computing and Communication, Manipal, India, 2017, pp.16-27. DOI: https://doi.org/10.1007/978-981-10-6898-0_2   DOI
11 Sangbong Nam, Donoung Lee, "Developing Digital Musical Instrument, mPoi, by Taking Advantage of Sensor Interfaces: Focused on the Multimedia Music Piece, "Jwibul"", Asia-pacific Journal of Convergent Research Interchange, pp. 11-19, Vol.6, No.7, July 31, 2020. DOI: http://dx.doi.org/10.47116/apjcri.2020.07.02   DOI
12 Lim C. H., Lee P. J., "Security of interactive DSA batch verification", Electronics Letters, Vol.30, No.19, pp.1592-1593, September 15, 1994. DOI: https://doi.org/10.1049/el:19941112   DOI
13 Antipa A., Brown D., Gallant R., et al. "Accelerated verification of ECDSA signatures", Proceedings of the International Workshop on Selected Areas in Cryptography, Kingston, ON, Canada, 2005, pp.307-318. DOI: https://doi.org/10.1007/11693383_21   DOI
14 Bernstein D. J., Doumen J., Lange T, et al. "Faster batch forgery identification", Proceedings of International Conference on Cryptology in India, Kolkata, India, 2012, pp.454-473. DOI: https://doi.org/10.1007/978-3-642-34931-7_26   DOI
15 Karati S., Das A., Roychowdhury D, et al. "New algorithms for batch verification of standard ECDSA signatures", Journal of Cryptographic Engineering, Vol.4, No.4, pp.237-258. November 30, 2014. DOI: https://doi.org/10.1007/s13389-014-0082-x   DOI
16 Hwang M. S., Lin I. C., Hwang K. F., "Crypt analysis of the batch verifying multiple RSA digital signatures", Informatica, Vol.11, No.1, pp.15-19, January 31, 2000. WEB: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.3241&rep=rep1&type=pdf
17 K. Asish vardhan, "Some Studies on Digital Image Segmentation Techniques", Asia-pacific Journal of Convergent Research Interchange, Vol.5, No.1, pp. 77-89, March 31, 2019. DOI: http://dx.doi.org/10.21742/apjcri.2019.03.08   DOI
18 Kittur A. S., Pais A. R. "A new batch verifications scheme for ECDSA* signatures", Sadhana, Vol.44, Article No.157, pp.157-169, June 7, 2019. DOI: https://doi.org/10.1007/s12046-019-1142-9   DOI
19 Kui-hwa Park, "Impact of Digital Convergence Technology on the Logistics Value Chain", Asia-pacific Journal of Convergent Research Interchange, Vol.7, No.1, pp. 33-48, January 31, 2021. DOI: http://dx.doi.org/10.47116/apjcri.2021.01.04   DOI
20 Yuan Lin, "Research on Interactively Digital Display for Cultural Heritage- Discovering the Hall of Mental Cultivation: A Digital Experience Exhibition", Asia-pacific Journal of Convergent Research Interchange, Vol.6, No.8, pp. 51-67, August 31, 2020. DOI: http://dx.doi.org/10.47116/apjcri.2020.08.06   DOI
21 Su Min Shin, Vandana Roy, "Hybrid key-Based Encryption in Cloud Storage", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.3, pp. 29-34, September 30, 2016 DOI: http://dx.doi.org/10.21742/APJCRI.2016.09.04   DOI
22 Bao F., Lee C. C., Hwang M. S., "Crypt analysis and improvement on batch verifying multiple RSA digital signatures", Applied Mathematics and Computation, Vol.172, No.2, pp.1195-1200, January 15, 2006. DOI: https://doi.org/10.1016/j.amc.2005.03.016   DOI
23 Johnson D., Menezes A., "The elliptic curve digital signature algorithm (ECDSA)", International Journal on Information Security, Vol.1, No.1, pp.36-63, January 31, 2001. DOI: https://doi.org/10.1007/s102070100002   DOI
24 Naccache D., M' Raihi D., Vaudenay S., et al. "Can D.S.A be improved? Complexity trade-offs with the digital signature standard", Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 1994, pp.77-85. DOI: https://doi.org/10.1007/BFb0053426   DOI
25 Jung Hyun Kim, "Proposal for Advanced Attribute-based Encryption in Mobile Cloud Computing", Asia-pacific Journal of Convergent Research Interchange, Vol.1, No.4, pp. 45-51, December 31, 2015. DOI: http://dx.doi.org/10.21742/apjcri.2015.12.07   DOI
26 Pavan Yadav, "Advanced Looping Broadcast Proxy Re-Encryption in Cloud computing", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.1, pp. 21-28, March 31, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.03.04   DOI
27 Jae Yoon Lee, Mounika Durbha, "Customary Broadcast Encryption with Advanced Encryption and Short ciphertexts", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.2, pp. 27-33, June 30, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.06.04   DOI
28 Bhargavi Nadella, "Data Encryption using Geometric Range", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.3, pp. 21-28, September 30, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.09.03   DOI
29 Harn L, "DSA type secure interactive batch verification protocol", Electronics Letters, Vol.34, No.4, pp.257-258, February 16, 1995 DOI: https://doi.org/10.1049/el:19950203   DOI
30 Hwang M. S., Lee C. C., Tang Y. L., "Two simple batch verifying multiple digital signatures", Proceedings of Information and Communications Security, Xian, China, 2001, pp.233-237. DOI: https://doi.org/10.1007/3-540-45600-7_26   DOI