References
- A. Fiat, "Batch RSA," Adv. Cryptology, Santa Barbara, CA, USA, Aug. 20-24, 1989, pp. 175-185.
- C.H. Lim and P.J. Lee, "Security of Interactive DSA Batch Verification," IEEE Electron. Lett., vol. 30, no. 19, 1994, pp. 1592-1593. https://doi.org/10.1049/el:19941112
- S.M. Yen and C.S. Laih, "Improved Digital Signature Suitable for Batch Verification," IEEE Trans. Comput., vol. 44, no. 7, 1995, pp. 957-959. https://doi.org/10.1109/12.392857
- M. Bellare, J.A. Garay, and T. Rabin, "Fast Batch Verification for Modular Exponentiation and Digital Signatures," Int. Conf. Theory Appl. Cryptographic Techn., Espoo, Finland, May 31-June 4, 1998, pp. 236-250.
- A. Shamir, "Identity-Based Cryptosystems and Signature Schemes," Adv. Cryptology, Santa Barbara, CA, USA, Aug. 19-22, 1984, pp. 47-53.
- D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Adv. Cryptology, Santa Barbara, CA, USA, Aug. 19-23, 2001, pp. 213-229.
- J.C. Cha and J.H. Cheon, "An Identity-Based Signature Scheme from Gap Diffie-Hellman Groups," Int. Workshop Practice Theory Public Key Cryptography, Miami, FL, USA, Jan. 6-8, 2003, pp. 18-30.
- F. Hess, "Efficient Identity Based Signature Schemes Based on Pairings," Sel. Areas Cryptography, St. John's, Canada, Aug. 15-16, 2002, pp. 310-324.
- K.G. Paterson, "ID-Based Signatures from Pairings on Elliptic Curves," IEEE Electron. Lett., vol. 38, no. 18, 2002, pp. 1025-1026. https://doi.org/10.1049/el:20020682
- P.V.S.S.N. Gopal, P.V. Reddy, and T. Gowri, "New Identity Based Signature Scheme Using Bilinear Pairings over Elliptic Curves," IEEE Int. Adv. Comput. Conf., Ghaziabad, India, Feb. 22-23, 2013, pp. 361-365.
- H. Yoon, J.H. Cheon, and Y. Kim, "Batch Verifications with ID-Based Signatures," Int. Conf. Inf. Security Cryptology, Seoul, Rep. of Korea, Dec. 2-3, 2004, pp. 233-248.
- T. Cao, D. Lin, and R. Xue, "Security Analysis of Some Batch Verifying Signatures from Pairings," Int. J. Netw. Security, vol. 3, no. 2, 2006, pp. 138-143.
- S. Cui, P. Duan, and C.W. Chan, "An Efficient Identity-Based Signature Scheme with Batch Verifications," Int. Conf. Scalable Inf. Syst., Hong Kong, China, May 29-June 1, 2006, vol. 152, no. 22.
- H.F. Chiang, S.M. Yen, and H.C. Lin, "Security Analysis of Batch Verification on Identity-Based Signature Schemes," WSEAS Int. Conf. Comput., Crete Island, Greece, July 26-28, 2007, pp. 50-55.
- C. Zhang et al., "An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks," IEEE Conf. Comput. Commun., Phoenix, AZ, USA, Apr. 15-17, 2008, pp. 816-824.
- Y.M. Tseng, T.Y. Wu, and J.D. Wu, "Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings," IEEE Int. Conf. Availability, Rel. Security, Fukuoka, Japan, Mar. 16-19, 2009, pp. 935-940.
- J.Y. Hwang et al., "New Efficient Batch Verification for an Identity-Based Signature Scheme," Security Commun. Netw., vol. 8, no. 15, Oct. 2015, pp. 2524-2535. https://doi.org/10.1002/sec.1194
- Y. Ren et al., "An Efficient Batch Verifying Scheme for Detecting Illegal Signatures," Int. J. Netw. Security, vol. 17, no. 4, Jan. 2015, pp. 463-470.
- E.J. Goh and S. Jarecki, "A Signature Scheme as Secure as the Diffie-Hellman Problem," Int. Conf. Theory Appl. Cryptographic Techn., Warsaw, Poland, May 4-8, 2003, pp. 401-415.
- J. Katz and N. Wang, "Efficiency Improvements for Signature Schemes with Tight Security Reductions," ACM Conf. Comput. Commun. Security, Washington, DC, USA, Oct. 27-30, 2003, pp. 155-164.
- D. Pointcheval and J. Stern, "Security Arguments for Digital Signatures and Blind Signatures," J. Cryptology, vol. 13, no. 3, June 2000, pp. 361-396. https://doi.org/10.1007/s001450010003
- P.S.L.M. Barreto et al., "Efficient Algorithms for Pairing-Based Cryptosystems," Adv. Cryptology, Santa Barbara, CA, USA, Aug. 18-22, 2002, pp. 354-369.
- N. Koblitz, A. Menezes, and S. Vanstone, "The State of Elliptic Curve Cryptography," Des., Codes, Cryptography, vol. 19, no. 2, Mar. 2000, pp. 173-193. https://doi.org/10.1023/A:1008354106356
- A. Menezes, P. Van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, Boca Raton, USA: CRC Press, LLC, 1996.