<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf22203</article-id><article-id pub-id-type="doi">10.15388/Informatica.2011.322</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>A Method of Finding Bad Signatures in an RSA-Type Batch Verification<xref ref-type="fn" rid="fn1"><sup>✩</sup></xref></article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Kim</surname><given-names>Kitae</given-names></name><email xlink:href="mailto:ktkim@inha.ac.kr">ktkim@inha.ac.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Yie</surname><given-names>Ikkwon</given-names></name><email xlink:href="mailto:ikyie@inha.ac.kr">ikyie@inha.ac.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Lim</surname><given-names>Seongan</given-names></name><email xlink:href="mailto:seongannym@yahoo.co.kr">seongannym@yahoo.co.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Park</surname><given-names>Haeryong</given-names></name><email xlink:href="mailto:snupark@kisa.or.kr">snupark@kisa.or.kr</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/></contrib><aff id="j_INFORMATICA_aff_000">Department of Mathematics, Inha University, Yonghyun-dong 253, Nam-gu, Incheon, 402-751, Korea</aff><aff id="j_INFORMATICA_aff_001">Department of Mathematics, Ewha Womans University, Daehyun-dong 11-1, Seodaemun-gu, Seoul, 120-750, Korea</aff><aff id="j_INFORMATICA_aff_002">KISA, IT Venture Tower, Garak-dong 78, Songpa-gu, Seoul, 138-950, Korea</aff></contrib-group><author-notes><fn id="fn1"><label><sup>✩</sup></label><p>This work was supported by Priority Research Centers Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (2009-0093827).</p></fn></author-notes><pub-date pub-type="epub"><day>01</day><month>01</month><year>2011</year></pub-date><volume>22</volume><issue>2</issue><fpage>189</fpage><lpage>201</lpage><history><date date-type="received"><day>01</day><month>07</month><year>2009</year></date><date date-type="accepted"><day>01</day><month>01</month><year>2011</year></date></history><abstract><p>Batch cryptography has been developed into two main branches – batch verification and batch identification. Batch verification is a method to determine whether a set of signatures contains invalid signatures, and batch identification is a method to find bad signatures if a set of signatures contains invalid signatures. Recently, some significant developments appeared in such field, especially by Lee et al., Ferrara et al. and Law et al., respectively. In this paper, we address some weakness of Lee et al.'s earlier work, and propose an identification method in an RSA-type signature. Our method is more efficient than the well known divide and conquer method for the signature scheme. We conclude this paper by providing a method to choose optimal divide and conquer verifiers.</p></abstract><kwd-group><label>Keywords</label><kwd>batch verification</kwd><kwd>batch identification</kwd><kwd>RSA-type signature</kwd></kwd-group></article-meta></front></article>