In this paper, the authors have introduced three authentication methods including RSA, Harn's, and their improved scheme. They also introduce the performance of these three schemes and some illegal signature detections in their scheme. According to the experiment result shows, the performance of Harn's scheme is the best when there does not have any signature-verification faults and their scheme is not suitable for batch verification when the messages amount is small. However, there are two kinds of attacks that can cheat Harn's scheme and their scheme cannot find out where the signature-verification fault is located if the batch verification fails. Therefore, their improved scheme could resist the weakness of Harn's and quickly find out where the signature-verification fault is located.
International Journal of Innovative Computing Information and Control