Content deleted Content added
→Further Developments: (cryptography) -> signature scheme. |
|||
Line 47:
# Compute t(x) = a(x)·s<sub>0</sub>(x) + s<sub>1</sub>(x)
# Distribute t(x) as the entity's public key
The polynomials s<sub>0</sub>(x) and s<sub>1</sub>(x) serve as the private key and t(x) is the corresponding
If this problem is difficult to solve, then the signature scheme will be difficult to forge. [See the Wikipedia article on [[Ring Learning with Errors]] or [[Ideal lattice cryptography|Ideal Lattice Cryptography]] for more details on the theoretical difficulty of this problem]
|