Check out the new USENIX Web site. next up previous
Next: mRSA Encryption. Up: mRSA in detail Previous: mRSA Key Setup.

mRSA Signatures.

A user generates a signature on a message m as follows: Note that in Step 2 the user Ui validates the response from the SEM. Signature verification is identical to that in standard RSA.

Gene Tsudik
2001-05-10