Return to Article Details Security Analysis Using Batch Verification Scheme Download Download PDF