Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Batch verification with ID-based signature

Handbook of Research on Developments and Trends in Wireless Sensor Networks: From Principle to Practice
Although there are advantages to ID-based cryptography signature schemes based on pairing, the signature verifications are at least ten times slower than that of DSA or RSA. The batch verification of many signatures increases efficiency.
Published in Chapter:
A Survey on Applied Cryptography in Secure Mobile Ad Hoc Networks and Wireless Sensor Networks
Jianmin Chen (Florida Atlantic University, USA) and Jie Wu (Florida Atlantic University, USA)
DOI: 10.4018/978-1-61520-701-5.ch012
Abstract
Many secure mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) use techniques of applied cryptography. Numerous security routing protocols and key management schemes have been designed based on public key infrastructure (PKI) and identity-based cryptography. Some of these security protocols are fully adapted to fit the limited power, storage, and CPUs of these networks. For example, one-way hash functions have been used to construct disposable secret keys instead of creating public/private keys for the public key infrastructure. In this survey of MANET and WSN applications we present many network security schemes using cryptographic techniques and give three case studies of popular designs.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR