Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 임선간 | - |
dc.date.accessioned | 2016-08-29T12:08:20Z | - |
dc.date.available | 2016-08-29T12:08:20Z | - |
dc.date.issued | 2011 | - |
dc.identifier.issn | 1816-353X | - |
dc.identifier.other | OAK-18167 | - |
dc.identifier.uri | https://dspace.ewha.ac.kr/handle/2015.oak/231270 | - |
dc.description.abstract | Batch cryptography has been developed into two main branches - batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially by Ferrara et al. [10] and Law et al. [15], respectively. However, no batch identification method for group signa-ture have been suggested. In this paper, by exploiting earlier works on standard signature schemes, we propose methods of batch verification and batch identification of a group signature scheme. | - |
dc.language | English | - |
dc.title | Batch verification and finding invalid signatures in a group signature scheme | - |
dc.type | Article | - |
dc.relation.issue | 2 | - |
dc.relation.volume | 13 | - |
dc.relation.index | SCOPUS | - |
dc.relation.startpage | 61 | - |
dc.relation.lastpage | 70 | - |
dc.relation.journaltitle | International Journal of Network Security | - |
dc.identifier.scopusid | 2-s2.0-80054061233 | - |
dc.author.google | Kim K. | - |
dc.author.google | Yie I. | - |
dc.author.google | Lim S. | - |
dc.author.google | Nyang D. | - |
dc.contributor.scopusid | 임선간(56291562000) | - |
dc.date.modifydate | 20210301081004 | - |