A digital signature verification protocol utilises a pair of signature components incorporating a pair of private keys, one of which is a long term key and the other of which is a short term key. The long term key is applied to one of the signature components to reveal the short term key. The short tern key is then used to compute a value of a signature component contained in the signature. If the computed value and received values agree then authenticity is verified.

 
Web www.patentalert.com

< Method and apparatus for embedding data in audio signals

< Method and system for secure cashless gaming

> Method and apparatus for shuffle with proof, method and apparatus for shuffle verification, method and apparatus for generating input message sequence and program for same

> Method for establishing a common key between a central station and a group of subscribers

~ 00256