1
19kviews
| written 7.1 years ago by |
El-gamal digital signature scheme:
This scheme used the same keys but a different algorithm
The algorithm creates two digital signatures, these two signatures, are used in the verification phase.
The key generation process is the same as that of EI-gamal algorithms
The public key remains ($e_1, e_2, p$) and the …