上QQ阅读APP看书,第一时间看更新
Signing process
The signing operation is performed by the owner of the message using the private key to prove their authenticity. Let's say Alice is the owner of a document that has a message m, and wants to distribute it to others in the network. Now, Alice will initially hash the message and use her private key to sign the document. The signature is created as follows, where Fs is the signature function, Fh is the hashing function, m is the message, and dA is Alice's private key:
S = Fs (Fh (m), dA)
Alice will now distribute her signature, along with the message, to everyone in the network.