verification key


Also found in: Dictionary, Medical, Legal.

verification key

The verification key is the public key used in a digital signature. Contrast with signing key. See digital signature and public key cryptography.
Mentioned in ?
References in periodicals archive ?
The length of the signature and the verification key is equal to np bits, and to generate the verification key, function f must be used p([2.sup.w]-1) times.
(iv) PubVer(PP, [VK.sub.x], [[sigma].sub.out]) [right arrow] {accept, reject}: The deterministic public verification algorithm uses the public parameter PP and public verification key [VK.sub.x] to check whether the final result is correct and returns accept or reject accordingly.
With the use of the above closed form efficient PRF in Algorithm 2, we can realize public verifiability by letting the PRF value be a part of the verification key. Then our remaining goal is to make this public verification process "blind".
Let [??] be the signing key of the proxy [P.sub.1] whose verification key is [R.sub.3.sup.(1)].
Let [??] be the signing key of the proxy [P.sub.l] whose verification key is [R.sub.3.sup.(l)].
The miner includes their own verification key in the transaction
digital signing key-pairs on local computers, and the verification key
Thus, any vessel in this fleet can directly input the objective input [omega] for F and an accompanied computation function G over data set G along with randomly chosen messages m, m' altogether, to generate a problem description [[sigma].sub.[omega],G] and a verification key [VK.sub.[omega],G].
Hence, output the problem description and the verification key information as
We first formalize a security model of ABE with verifiable out-sourced decryption by introducing a verification key in the output of the encryption algorithm.
On input of a biometric vector b and a public parameter [OMEGA] in PP, the user (with identity ID) derives a key, denoted by [K.sub.b], and generates a public verification key, denoted by [PK.sub.ID], for authentication.
The algorithms involved in the verification key generation and token verification as well as system table update are discussed in Section 4.2.

Full browser ?