Elliptic Curve DSA - Signature Verification Algorithm

Signature Verification Algorithm

For Bob to authenticate Alice's signature, he must have a copy of her public key . If he does not trust the source of, he needs to validate the key ( here indicates the identity element):

  1. Check that is not equal to and its coordinates are otherwise valid
  2. Check that lies on the curve
  3. Check that

After that, Bob follows these steps:

  1. Verify that and are integers in . If not, the signature is invalid.
  2. Calculate, where HASH is the same function used in the signature generation. Let be the leftmost bits of .
  3. Calculate .
  4. Calculate and .
  5. Calculate .
  6. The signature is valid if, invalid otherwise.

Note that using Straus's algorithm (also known as Shamir's trick) a sum of two scalar multiplications can be calculated faster than with two scalar multiplications.

Read more about this topic:  Elliptic Curve DSA

Famous quotes containing the words signature and/or verification:

    The childless experts on child raising also bring tears of laughter to my eyes when they say, “I love children because they’re so honest.” There is not an agent in the CIA or the KGB who knows how to conceal the theft of food, how to fake being asleep, or how to forge a parent’s signature like a child.
    Bill Cosby (20th century)

    A fact is a proposition of which the verification by an appeal to the primary sources of our knowledge or to experience is direct and simple. A theory, on the other hand, if true, has all the characteristics of a fact except that its verification is possible only by indirect, remote, and difficult means.
    Chauncey Wright (1830–1875)