Meta-ElGamal signature schemes

  • Authors:
  • Patrick Horster;Holger Petersen;Markus Michels

  • Affiliations:
  • Theoretical Computer Science and Information Security, University of Technology Chemnitz-Zwickau, Straβe der Nationen 62, D-09111 Chemnitz, Germany;Theoretical Computer Science and Information Security, University of Technology Chemnitz-Zwickau, Straβe der Nationen 62, D-09111 Chemnitz, Germany;Theoretical Computer Science and Information Security, University of Technology Chemnitz-Zwickau, Straβe der Nationen 62, D-09111 Chemnitz, Germany

  • Venue:
  • CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
  • Year:
  • 1994

Quantified Score

Hi-index 0.00

Visualization

Abstract

There have been many approaches in the past to generalize the ElGamal signature scheme. In this paper we integrate all these approaches in a Meta-ElGamal signature scheme. We also investigate some new types of variations, that haven't been considered before. By this method we obtain in our example settings numerous variants of the ElGamal scheme. From these variants, we can extract new, highly efficient signature schemes, which haven't been proposed before. As an example, we present efficient DSA-variants.