next up previous
Next: Security of This Approach Up: The BiBa Signature Scheme Previous: Signature Generation

Signature Verification

The verifier receives message M and the BiBa signature si, sj . We assume for now that the verifier has an efficient method to authenticate the SEALs si, sj. To verify the BiBa signature the verifier computes h=H(m), checks that si ≠sj, and Gh( si ) = Gh(sj).

Note that the verification is very light-weight: Without considering the SEAL authentication, the verification only requires one hash function computation and two hash function computations.


next up previous
Next: Security of This Approach Up: The BiBa Signature Scheme Previous: Signature Generation

Adrian Perrig
Mon Nov 26 15:18:51 PST 2001