# A public key cryptosystem and a signature scheme based on discrete logarithms

@article{Gamal1984APK, title={A public key cryptosystem and a signature scheme based on discrete logarithms}, author={Taher El Gamal}, journal={IEEE Trans. Inf. Theory}, year={1984}, volume={31}, pages={469-472} }

-A new signature scheme is proposed, together with an imple- mentation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields.

## 4,643 Citations

### A public-key cryptosystem based on second order linear sequences

- Computer Science, Mathematics
- 2008

Based on Lucas functions, an improved version of the Diffie-Hellman distribution key scheme and to the ElGamal public key cryptosystem scheme are proposed, together with an implementation and…

### A matricial public key cryptosystem with digital signature

- Computer Science, Mathematics
- 2008

A new public key cryptosystem using block upper triangular matrices with elements in Zp, based on a generalization of the discrete logarithm problem over a finite group, which allows an ElGamal based digital signature scheme.

### A Publicly Verifiable Authenticated Encryption Scheme Based on Factoring and Discrete Logarithms

- Computer Science, MathematicsInt. J. Netw. Secur.
- 2017

It is pointed out that even if either factoring or discrete logarithms is broken, this scheme still could keep the authentication, integration, and confidentiality of the message.

### Public-Key Cryptosystems from Lattice Reduction Problems

- Computer Science, MathematicsCRYPTO
- 1996

A new proposal for a trapdoor one-way function, from which the security of the new construction is based on the conjectured computational difficulty of lattice-reduction problems, providing a possible alternative to existing public-key encryption algorithms and digital signatures such as RSA and DSS.

### An ElGamal-Like Digital Signature Based on Elliptic Curves

- Computer Science, MathematicsMSPN
- 2019

This work ameliorated the signature equation to make it more secure against current attacks, and presents a new variant of the ElGamal digital signature scheme based on the elliptic curves notion.

### Public-Key Cryptosystems with Secret Encryptor and Digital Signature

- Computer Science, Mathematics
- 2013

A variety of algorithms for secure transmission of information via open communication channels based on the discrete logarithm problem that do not require search for a generator are described and compared.

### Improved digital signature scheme based on factoring and discrete logarithms

- Computer Science, Mathematics
- 2002

This article proposes an improvement of He’s digital signature scheme that is secure and efficient, and based on factoring and discrete logarithms.

### A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack

- Computer Science, MathematicsCRYPTO
- 1998

A new public key cryptosystem is proposed and analyzed. The scheme is quite practical, and is provably secure against adaptive chosen ciphertext attack under standard intractability assumptions.…

### A Public Key Cryptosystem Based on Block Upper Triangular Matrices

- Computer Science, Mathematics
- 2005

We propose a public key cryptosystem based on block upper triangular matrices. This system is a variant of the Discrete Logarithm Problem with elements in a finite group, capable of increasing the…

### A General Construction of IND-CCA2 Secure Public Key Encryption

- Computer Science, MathematicsIMACC
- 2003

A general construction for public key encryption schemes that are IND-CCA2 secure in the random oracle model and it is shown that the scheme proposed in [1,2] fits the general framework and that the method of analysis leads to a more efficient security reduction.

## References

SHOWING 1-10 OF 11 REFERENCES

### An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1978

An improved algorithm is derived which requires O(log2 p) complexity if p 1 has only small prime factors and such values of p must be avoided in the cryptosystem.

### A method for obtaining digital signatures and public-key cryptosystems

- Computer Science, MathematicsCACM
- 1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.

### New Directions in Cryptography

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1976

This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

### Discrete Logarithms in Finite Fields and Their Cryptographic Significance

- Computer Science, MathematicsEUROCRYPT
- 1984

This paper surveys and analyzes known algorithms in this area, with special attention devoted to algorithms for the fields GF(2n), finding that in order to be safe from attacks using these algorithms, the value of n for which GF( 2n) is used in a cryptosystem has to be very large and carefully chosen.

### A subexponential-time algorithm for computing discrete logarithms over GF(p^2)

- Computer Science
- 1985

An algorithm for computing discrete logarithms over GF (p^{2}) , where p is a prime, in subexponential time is described, which uses quadratic fields as the appropriate algebraic structure.

### A subexponential-time algorithm for computing discrete logarithms over GF(p2)

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1985

An algorithm for computing discrete logarithms over GF(p*), where p is a prime, in subexponential time is described, which uses quadratic fields as the appropriate algebraic structure.

### Signatures through Approximate Representation by Quadratic Forms

- Computer Science, MathematicsCRYPTO
- 1983

A signature scheme where the private key is a random (n, n)-matrix T with coefficients in ℤm/mℤ, m a product of two large primes, which is faster than the RSA-scheme and knowledge of this prime decomposition enables forging signatures.

### A subexponential algorithm for the discrete logarithm problem with applications to cryptography

- Computer Science, Mathematics20th Annual Symposium on Foundations of Computer Science (sfcs 1979)
- 1979

A new algorithm is presented for the Discrete Logarithm Problem which runs in RTIME better than O(qE) for all E > O and the most efficient incarnation of this algorithm runs inRTIME O(2(O(/10g(q)loglog(q))).

### Fast evaluation of logarithms in fields of characteristic two

- Computer ScienceIEEE Trans. Inf. Theory
- 1984

The ideas give a dramatic improvement even for moderate-sized fields such as GF (2^{127}) , and make (barely) possible computations in fields of size around 2^{400} .

### Monte-Carlo factoring algorithm with finite storage

- Mathematics, Computer ScienceTheoretical Computer Science
- 1983

An algorithm is presented which will factor an integer n quite efficiently if the class number h (-n) is free of large prime divisors and the running time T(n) satisfies prob [T(m)≦n1/2r]≳(r+2)−(r−2) for random me[n/2, n] and r≧2.