next up previous
Next: Security Considerations Up: The BiBa Signature Scheme Previous: BiBa Extensions

The BiBa Signature Scheme

 

We now describe the BiBa signature scheme in more detail. To sign message m the signer computes the m3 bit long hash h=H(m|c), where c is a counter value that the signer increments if it cannot find a signature. The signer has t SEALs (each is m2 bits long), and maps them with the hash function Gh into n bins. Any k-way collision of SEALs forms the signature.

Verification is straightforward. We assume that the verifier knows the BiBa parameters k and n, the hash function H, and the hash function family G.

Assume the verifier receives message m and BiBa signature x1, &ldots;, Sxk, c. First, the verifier verifies that all k SEALs are distinct and authentic. Next, the verifier computes h=H(m|c), and accepts the signature if all Gh(Sxi) (for 1 ≤i ≤k) are equal.


next up previous
Next: Security Considerations Up: The BiBa Signature Scheme Previous: BiBa Extensions

Adrian Perrig
Mon Nov 26 15:18:51 PST 2001