{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:15:42Z","timestamp":1750220142185,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,11]]},"DOI":"10.1145\/3514105.3514113","type":"proceedings-article","created":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T10:23:47Z","timestamp":1648808627000},"page":"42-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Bitwise Division-based Searching Algorithm for Batch Verification"],"prefix":"10.1145","author":[{"given":"Gencheng","family":"Xu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]},{"given":"Shiyu","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]},{"given":"Kaicheng","family":"Tang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of Electronic Science and Technology of China, China"}]},{"given":"Yimin","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Cybersecurity, Chengdu University of Information Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2022,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"6","volume-title":"2017 IEEE International Conference on Communications (ICC)","author":"Liu Jingwei","unstructured":"[ 1 ] Jingwei Liu , Jinping Han , Longfei Wu , Rong Sun , and Xiaojiang Du. Vdas : verifiable data aggregation scheme for internet of things . In 2017 IEEE International Conference on Communications (ICC) , pages 1\u2013 6 . IEEE, 2017. [1] Jingwei Liu, Jinping Han, Longfei Wu, Rong Sun, and Xiaojiang Du. Vdas: verifiable data aggregation scheme for internet of things. In 2017 IEEE International Conference on Communications (ICC), pages 1\u20136. IEEE, 2017."},{"key":"e_1_3_2_1_2_1","volume-title":"An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of information security and applications, 44:184\u2013200","author":"Kamil Ismaila\u00a0Adeniyi","year":"2019","unstructured":"[ 2 ] Ismaila\u00a0Adeniyi Kamil and Sunday\u00a0Oyinlola Ogundoyin . An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of information security and applications, 44:184\u2013200 , 2019 . [2] Ismaila\u00a0Adeniyi Kamil and Sunday\u00a0Oyinlola Ogundoyin. An improved certificateless aggregate signature scheme without bilinear pairings for vehicular ad hoc networks. Journal of information security and applications, 44:184\u2013200, 2019."},{"key":"e_1_3_2_1_3_1","volume-title":"Electronic and Automation Control Conference (IAEAC)","author":"Yang Xiaodong","year":"2018","unstructured":"[ 3 ] Xiaodong Yang , Chunlin Chen , Tingchun Ma , Yutong Li , and Caifen Wang . An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. In 2018 IEEE 3rd Advanced Information Technology , Electronic and Automation Control Conference (IAEAC) , 2018 . [3] Xiaodong Yang, Chunlin Chen, Tingchun Ma, Yutong Li, and Caifen Wang. An improved certificateless aggregate signature scheme for vehicular ad-hoc networks. In 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), 2018."},{"key":"e_1_3_2_1_4_1","first-page":"2021","article-title":"Invalid signatures searching bitwise divisions-based algorithm for vehicular ad-hoc networks","author":"Ye Xin","year":"2021","unstructured":"[ 4 ] Xin Ye , Gencheng Xu , Xueli Cheng , Jin Zhou , and Zhiguang Qin . Invalid signatures searching bitwise divisions-based algorithm for vehicular ad-hoc networks . Journal of Advanced Transportation , 2021 , 2021 . [4] Xin Ye, Gencheng Xu, Xueli Cheng, Jin Zhou, and Zhiguang Qin. Invalid signatures searching bitwise divisions-based algorithm for vehicular ad-hoc networks. Journal of Advanced Transportation, 2021, 2021.","journal-title":"Journal of Advanced Transportation"},{"key":"e_1_3_2_1_5_1","first-page":"346","volume-title":"2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS)","year":"2020","unstructured":"[ 5 ] X.\u00a0Hu, W.\u00a0Tan, C.\u00a0Ma, F.\u00a0Chen, and C.\u00a0Yu. Study on security analysis and efficient imrovement of certificateless aggregate signature scheme . In 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS) , pages 343\u2013 346 , 2020 . [5] X.\u00a0Hu, W.\u00a0Tan, C.\u00a0Ma, F.\u00a0Chen, and C.\u00a0Yu. Study on security analysis and efficient imrovement of certificateless aggregate signature scheme. In 2020 IEEE 11th International Conference on Software Engineering and Service Science (ICSESS), pages 343\u2013346, 2020."},{"key":"e_1_3_2_1_6_1","first-page":"2021","article-title":"Certificateless-based anonymous authentication and aggregate signature scheme for vehicular ad hoc networks","author":"Ye Xin","year":"2021","unstructured":"[ 6 ] Xin Ye , Gencheng Xu , Xueli Cheng , Yuedi Li , and Zhiguang Qin . Certificateless-based anonymous authentication and aggregate signature scheme for vehicular ad hoc networks . Wireless Communications and Mobile Computing , 2021 , 2021 . [6] Xin Ye, Gencheng Xu, Xueli Cheng, Yuedi Li, and Zhiguang Qin. Certificateless-based anonymous authentication and aggregate signature scheme for vehicular ad hoc networks. Wireless Communications and Mobile Computing, 2021, 2021.","journal-title":"Wireless Communications and Mobile Computing"},{"key":"e_1_3_2_1_7_1","first-page":"207","volume-title":"2019 International Conference on Advanced Science and Engineering (ICOASE)","author":"B.","year":"2019","unstructured":"[ 7 ] Sattar\u00a0 B. Sadkhan and Basim\u00a0S. Yaseen. Hybrid method to implement a parallel search of the cryptosystem keys . In 2019 International Conference on Advanced Science and Engineering (ICOASE) , pages 204\u2013 207 , 2019 . [7] Sattar\u00a0B. Sadkhan and Basim\u00a0S. Yaseen. Hybrid method to implement a parallel search of the cryptosystem keys. In 2019 International Conference on Advanced Science and Engineering (ICOASE), pages 204\u2013207, 2019."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE.2018.00263"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSCE.2013.6719971"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00862-7_21"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2089544"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77272-9_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2006.207"},{"issue":"48","key":"e_1_3_2_1_14_1","first-page":"58","article-title":"Simplified small exponent test for batch verification","volume":"662","author":"Hwang Jung\u00a0Yeon","year":"2017","unstructured":"[ 14 ] Jung\u00a0Yeon Hwang , Boyeon Song , Daeseon Choi , Seung-Hun Jin , Hyun\u00a0Sook Cho , and Mun-Kyu Lee . Simplified small exponent test for batch verification . Theoretical Computer Science , 662 : 48 \u2013 58 , 2017 . [14] Jung\u00a0Yeon Hwang, Boyeon Song, Daeseon Choi, Seung-Hun Jin, Hyun\u00a0Sook Cho, and Mun-Kyu Lee. Simplified small exponent test for batch verification. Theoretical Computer Science, 662:48 \u2013 58, 2017.","journal-title":"Theoretical Computer Science"},{"key":"e_1_3_2_1_15_1","first-page":"306","volume-title":"2011 First International Conference on Data Compression, Communications and Processing","year":"2011","unstructured":"[ 15 ] Y.\u00a0Huang, C.\u00a0Lin, and F.\u00a0Leu. Verification of a batch of bad signatures by using the matrix-detection algorithm . In 2011 First International Conference on Data Compression, Communications and Processing , pages 299\u2013 306 , 2011 . [15] Y.\u00a0Huang, C.\u00a0Lin, and F.\u00a0Leu. Verification of a batch of bad signatures by using the matrix-detection algorithm. In 2011 First International Conference on Data Compression, Communications and Processing, pages 299\u2013306, 2011."},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Messages classification and dynamic batch verification scheme for vanets","year":"2019","unstructured":"[ 16 ] H.\u00a0Ferng, J.\u00a0Chen, M.\u00a0Lotfolahi, Y.\u00a0Tseng, and S.\u00a0Zhang . Messages classification and dynamic batch verification scheme for vanets . IEEE Transactions on Mobile Computing, pages 1 \u2013 1 , 2019 . [16] H.\u00a0Ferng, J.\u00a0Chen, M.\u00a0Lotfolahi, Y.\u00a0Tseng, and S.\u00a0Zhang. Messages classification and dynamic batch verification scheme for vanets. IEEE Transactions on Mobile Computing, pages 1\u20131, 2019.","journal-title":"IEEE Transactions on Mobile Computing, pages"}],"event":{"name":"icWCSN 2022: 2022 9th international Conference on Wireless Communication and Sensor Networks","acronym":"icWCSN 2022","location":"Dalian China"},"container-title":["2022 9th international Conference on Wireless Communication and Sensor Networks (ICWCSN)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514105.3514113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514105.3514113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:59:55Z","timestamp":1750186795000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514105.3514113"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,11]]},"references-count":16,"alternative-id":["10.1145\/3514105.3514113","10.1145\/3514105"],"URL":"https:\/\/doi.org\/10.1145\/3514105.3514113","relation":{},"subject":[],"published":{"date-parts":[[2022,1,11]]},"assertion":[{"value":"2022-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}