Comparing two pairing-based aggregate signature schemes (Q970534): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import recommendations run Q6534273
 
(6 intermediate revisions by 5 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10623-009-9334-7 / rank
Normal rank
 
Property / author
 
Property / author: Alfred J. Menezes / rank
Normal rank
 
Property / reviewed by
 
Property / reviewed by: Michael J. Jacobson jun. / rank
Normal rank
 
Property / author
 
Property / author: Alfred J. Menezes / rank
 
Normal rank
Property / reviewed by
 
Property / reviewed by: Michael J. Jacobson jun. / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: Publication / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-009-9334-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2140685585 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient pairing computation on supersingular abelian varieties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing-Friendly Elliptic Curves of Prime Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unrestricted Aggregate Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms for Black-Box Fields and their Application to Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434890 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information Security and Cryptology - ICISC 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Implementing Cryptographic Pairings over Barreto-Naehrig Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Exponentiation in Pairing-Friendly Groups Using Homomorphisms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairings for cryptographers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783726 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete Logarithms in $GF ( P )$ Using the Number Field Sieve / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Number Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4826108 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3615887 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Eta Pairing Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the relationship between squared pairings and plain pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2739458 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient and Generalized Pairing Computation on Abelian Varieties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sequential Aggregate Signatures and Multisignatures Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4940702 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Integer Variable χ–Based Ate Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Monte Carlo Methods for Index Computation (mod p) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Discrete logarithms and local units / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using number fields to compute logarithms in finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: The number field sieve for integers of low weight / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3543476 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On computable isomorphisms in efficient asymmetric pairing-based systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10623-009-9334-7 / rank
 
Normal rank
Property / Recommended article
 
Property / Recommended article: Unrestricted Aggregate Signatures / rank
 
Normal rank
Property / Recommended article: Unrestricted Aggregate Signatures / qualifier
 
Similarity Score: 0.8024357
Amount0.8024357
Unit1
Property / Recommended article: Unrestricted Aggregate Signatures / qualifier
 
Property / Recommended article
 
Property / Recommended article: Security of BLS and BGLS signatures in a multi-user setting / rank
 
Normal rank
Property / Recommended article: Security of BLS and BGLS signatures in a multi-user setting / qualifier
 
Similarity Score: 0.7968447
Amount0.7968447
Unit1
Property / Recommended article: Security of BLS and BGLS signatures in a multi-user setting / qualifier
 
Property / Recommended article
 
Property / Recommended article: Cryptology and Network Security / rank
 
Normal rank
Property / Recommended article: Cryptology and Network Security / qualifier
 
Similarity Score: 0.7950817
Amount0.7950817
Unit1
Property / Recommended article: Cryptology and Network Security / qualifier
 
Property / Recommended article
 
Property / Recommended article: Identity Based Aggregate Signcryption Schemes / rank
 
Normal rank
Property / Recommended article: Identity Based Aggregate Signcryption Schemes / qualifier
 
Similarity Score: 0.77960825
Amount0.77960825
Unit1
Property / Recommended article: Identity Based Aggregate Signcryption Schemes / qualifier
 
Property / Recommended article
 
Property / Recommended article: Information Security and Cryptology / rank
 
Normal rank
Property / Recommended article: Information Security and Cryptology / qualifier
 
Similarity Score: 0.76786375
Amount0.76786375
Unit1
Property / Recommended article: Information Security and Cryptology / qualifier
 
Property / Recommended article
 
Property / Recommended article: Universal Signature Aggregators / rank
 
Normal rank
Property / Recommended article: Universal Signature Aggregators / qualifier
 
Similarity Score: 0.76156473
Amount0.76156473
Unit1
Property / Recommended article: Universal Signature Aggregators / qualifier
 
Property / Recommended article
 
Property / Recommended article: Novel Efficient Certificateless Aggregate Signatures / rank
 
Normal rank
Property / Recommended article: Novel Efficient Certificateless Aggregate Signatures / qualifier
 
Similarity Score: 0.75944936
Amount0.75944936
Unit1
Property / Recommended article: Novel Efficient Certificateless Aggregate Signatures / qualifier
 
Property / Recommended article
 
Property / Recommended article: How to Aggregate the CL Signature Scheme / rank
 
Normal rank
Property / Recommended article: How to Aggregate the CL Signature Scheme / qualifier
 
Similarity Score: 0.75897276
Amount0.75897276
Unit1
Property / Recommended article: How to Aggregate the CL Signature Scheme / qualifier
 

Latest revision as of 19:46, 27 January 2025

scientific article
Language Label Description Also known as
English
Comparing two pairing-based aggregate signature schemes
scientific article

    Statements

    Comparing two pairing-based aggregate signature schemes (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    19 May 2010
    0 references
    This paper describes detailed security and performance comparisons of two aggregate signature schemes. The first (BGLS), due to \textit{D. Boneh, C. Gentry, B. Lynn} and \textit{H. Shacham} [Eurocrypt 2003, Lect. Notes Comput. Sci. 2656, 416--432 (2003; Zbl 1038.94553)], uses bilinear pairings and has a reductionist security proof assuming the random oracle model. The second (LOSSW), due to \textit{S. Lu, R. Ostrovsky, A. Sahai, H. Shacham} and \textit{B. Waters} [Eurocrypt 2006, Lect. Notes Comput. Sci. 4004, 465--485 (2006; Zbl 1140.94358)], also uses bilinear pairings but does not make use of the random oracle model for its security result. The schemes are compared when realized with a particular elliptic curve offering 128 bits of security due to \textit{P. S. L. M. Barreto} and \textit{M. Naehrig} [SAC 2005, Lect. Notes Comput. Sci. 3897, 319--331 (2006; Zbl 1151.94479)], and the protocol specifications and parameter selections are based on the best-known reductionist security arguments. The authors show that both signature schemes can be described using so-called Type 3 pairings (asymmetric pairings \(e: \mathbb{G}_1 \times \mathbb{G}_2 \rightarrow \mathbb{G}_T\) for which no efficiently-computable isomorphism between \(\mathbb{G}_1\) and \(\mathbb{G}_2\) is known) as opposed to the original setting of Type 2 pairings (an efficiently-computable isomorphism does exist). They argue that Type 3 pairings offer at least as much security in this context and that Type 2 pairings offer no performance benefits over Type 3 pairings using the the Barreto-Naehrig curves. Finally, the authors demonstrate that the BGLS scheme outperforms the LOSSW scheme with respect to size of public keys and signatures as well as signature generation and verification time.
    0 references
    pairing-based cryptography
    0 references
    aggregate signature schemes
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers