Signature Verification
The receiver knows the public key, the message, and the signature . At first, the receiver verifies the one-time signature of the message . If is a valid signature of, the receiver computes by hashing the public key of the one-time signature. For, the nodes of of the path are computed with . If equals the public key of the merkle signature scheme, the signature is valid.
Read more about this topic: Merkle Signature Scheme
Famous quotes containing the words signature and/or verification:
“The childless experts on child raising also bring tears of laughter to my eyes when they say, I love children because theyre so honest. There is not an agent in the CIA or the KGB who knows how to conceal the theft of food, how to fake being asleep, or how to forge a parents signature like a child.”
—Bill Cosby (20th century)
“Science is a system of statements based on direct experience, and controlled by experimental verification. Verification in science is not, however, of single statements but of the entire system or a sub-system of such statements.”
—Rudolf Carnap (18911970)