- ...synchronized.
- In contrast to TESLA, the authentication in BiBa is
instant and does not depend on the time synchronization error. However, a
large synchronization error results in a higher memory requirement of the
receiver.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...resources.
- MicroMint gains an additional computational advantage
because the bank can pre-compute coins, and an adversary has a small, limited
time to forge coins. Hence MicroMint requires very loose time
synchronization.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...vaLues.
- The name SEAL is already used for
the stream cipher developed by Rogaway and Coppersmith. We overload the term
in this work because a seal nicely describes the properties that a signer can
easily generate it, that it is hard to forge, and that a verifier can easily
authenticate it.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
- ...values.
- A minor point is that the signer needs to compute a
one-way function on the SEAL before placing the SEAL at the leaf node.
Otherwise the signer would disclose neighboring SEALs when it discloses
additional nodes for verification.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.