Public key encryption and signature schemes based on ... - CiteSeerX

0 downloads 0 Views 514KB Size Report
signature can be generated for a long message without using a hash func- tion, and ... is based on the difficulty of the root finding problem: A message is divided into ... by using the private key (p, q) to compute roots of the polynomials f(x) mod p ... The following examples illustrate the concepts of transversal and being in a.