摘要 |
<p>The method involves verifying a digital signature produced (S1) based on a secret key in the data carrier by a public key (S3), which is initially not stored in a data carrier and assigned to the secret key, before the signature is output (S5). The public key is computed (S2) based on components of the secret key in the data carrier, where the components are stored in the data carrier. The secret key is predetermined by secret exponents and two secret prime numbers, and the public key is predetermined by public exponents. An independent claim is also included for a portable data carrier comprising a processor.</p> |