next up previous
Next: Signature Verification Up: The BiBa Signature Scheme Previous: The Key Intuition

Signature Generation

To sign a message m, the signer first computes the hash h = H( m ). The signer then computes the hash function Gh (as we describe at the beginning of this section) to all the SEALs s1, &ldots;, st. The signer looks for a two-way collision of two SEALs: Gh(si) = Gh(sj), with si ≠sj. The pair si, sj forms the signature. Figure 1 shows an example. It is now clear why the BiBa acronym stands for Bins and Balls signature: the bins correspond to the range of the hash function Gh, and the balls correspond to the SEALs.

  figure114
Figure 1: Basic BiBa scheme

We exploit the asymmetric property that the signer has more SEALs than the adversary, and hence the signer can easily generate the BiBa signature with high probability. On the other hand, an adversary only knows the few disclosed SEALs and hence has a low probability to find a valid BiBa signature.


next up previous
Next: Signature Verification Up: The BiBa Signature Scheme Previous: The Key Intuition

Adrian Perrig
Mon Nov 26 15:18:51 PST 2001