A new version of ElGamal signature scheme
In the original ElGamal signature scheme and it’s variants, two secret integers-private key and one-time secret key are required to produce a signature on a message, m. The private key of a system will be used throughout the life of the system whereas the one-time secret key only be used once and mu...
Main Authors: | Eddie Shahril Ismail, Yahya Abu Hasan |
---|---|
Format: | Article |
Published: |
Universiti Kebangsaan Malaysia
2006
|
Similar Items
-
User authentication scheme based on the ElGamal signature for mobile communication system
by: LI Wei-ke, et al.
Published: (2005-01-01) -
User authentication scheme based on the ElGamal signature for mobile communication system
by: LI Wei-ke, et al.
Published: (2005-01-01) -
A Security-Mediated Encryption Scheme Based on ElGamal Variant
by: Boon Chian Tea, et al.
Published: (2021-10-01) -
Elliptic curve ElGamal encryption based location privacy-preserving scheme
by: Huibin LAI, et al.
Published: (2020-06-01) -
A proposed CCA-secure encryption on an ElGamal variant
by: Asbullah, Muhammad Asyraf, et al.
Published: (2012)