Research Article
Provably Secure Lattice-Based Self-Certified Signature Scheme
ā | Input: a message , , the signing key and other public parameters. | ā | Output: the signature . | (1) | Randomly select , and compute . | (2) | Compute , , and let . | (3) | Output the signature with probability , where . | (4) | If , repeat this algorithm. |
|