Signature Verification Algorithm
For Bob to authenticate Alice's signature, he must have a copy of her public key . If he does not trust the source of, he needs to validate the key ( here indicates the identity element):
- Check that is not equal to and its coordinates are otherwise valid
- Check that lies on the curve
- Check that
After that, Bob follows these steps:
- Verify that and are integers in . If not, the signature is invalid.
- Calculate, where HASH is the same function used in the signature generation. Let be the leftmost bits of .
- Calculate .
- Calculate and .
- Calculate .
- The signature is valid if, invalid otherwise.
Note that using Straus's algorithm (also known as Shamir's trick) a sum of two scalar multiplications can be calculated faster than with two scalar multiplications.
Read more about this topic: Elliptic Curve DSA
Famous quotes containing the words signature and/or verification:
“The childless experts on child raising also bring tears of laughter to my eyes when they say, I love children because theyre so honest. There is not an agent in the CIA or the KGB who knows how to conceal the theft of food, how to fake being asleep, or how to forge a parents signature like a child.”
—Bill Cosby (20th century)
“Science is a system of statements based on direct experience, and controlled by experimental verification. Verification in science is not, however, of single statements but of the entire system or a sub-system of such statements.”
—Rudolf Carnap (18911970)