Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Akinyele J., Green M., Hohenberger S., Pagano M. Journal of Computer Security22 (6):867-912,2014.Type:Article
Date Reviewed: Aug 20 2015

With the Internet of Things (IoT) quickly becoming a reality, the importance of secure communications between devices cannot be overstated. Since there are many small devices involved in such networks, the algorithms needed for authentication must be able to process a large number of messages both quickly and reliably. The contribution of this paper is in showing the generation of an efficient batch verifier from a high-level description of a signature scheme. The code generation approach adds the benefit of the generated code being automatically correct, provided the generator is correct. In this case, the generator creates a respective correctness proof as an additional benefit.

The paper starts out with a concise introduction presenting an overview of the problem, the contributions of the paper, and related approaches. Background and the basic definitions of the domain are presented in the following section. The general ideas of the AutoBatch toolchain developed by the authors are developed and illustrated in the following section, whereas the fourth section provides some benchmark results from controlled experiments as well as some relevant practice tests. The conclusion follows.

In summary, the approach looks very interesting and the paper is quite easy to read. To fully grasp what has been achieved with the toolchain provided, additional literature needs to be consulted; however, there are sufficient references in the paper.

Reviewer:  Markus Wolf Review #: CR143710 (1511-0961)
Bookmark and Share
 
Verification (D.4.5 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Verification": Date
Verification of the IBM RISC System/6000 by a dynamic biased pseudo-random test program generator
Aharon A., Dorfman B., Gofman E., Leibowitz M., Schwartzburd V., Bar-David A. IBM Systems Journal 30(4): 527-538, 1991. Type: Article
Dec 1 1993
A Specification and Verification Method for Preventing Denial of Service
Yu C., Gligor V. IEEE Transactions on Software Engineering 16(6): 581-592, 1990. Type: Article
Feb 1 1991
Using program transformations to provide safety properties for real-time systems
Tsai G., Wang S. Real-Time Systems 27(2): 191-207, 2004. Type: Article
Feb 23 2005
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy