The verifier receives message and the BiBa signature . We assume for now that the verifier has an efficient method to authenticate the SEALs . To verify the BiBa signature the verifier computes , checks that , and .
Note that the verification is very light-weight: Without considering the SEAL authentication, the verification only requires one hash function computation and two hash function computations.