1
18kviews
written 5.6 years ago by |
El-gamal digital signature scheme:
This scheme used the same keys but a different algorithm
The algorithm creates two digital signatures, these two signatures, are used in the verification phase.
The key generation process is the same as that of EI-gamal algorithms
The public key remains ($e_1, e_2, p$) and the …