...synchronized.
In contrast to TESLA, the authentication in BiBa is instant and does not depend on the time synchronization error. However, a large synchronization error results in a higher memory requirement of the receiver.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...resources.
MicroMint gains an additional computational advantage because the bank can pre-compute coins, and an adversary has a small, limited time to forge coins. Hence MicroMint requires very loose time synchronization.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...vaLues.
The name SEAL is already used for the stream cipher developed by Rogaway and Coppersmith. We overload the term in this work because a seal nicely describes the properties that a signer can easily generate it, that it is hard to forge, and that a verifier can easily authenticate it.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
...values.
A minor point is that the signer needs to compute a one-way function on the SEAL before placing the SEAL at the leaf node. Otherwise the signer would disclose neighboring SEALs when it discloses additional nodes for verification.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

Adrian Perrig
Mon Nov 26 15:18:51 PST 2001