The attacker,Eve,works with Alice and has seenm1 and she has seen c2=(α b , m2α ab ) arrive. ... Adam is given the taskof setting upan ElGamal schemebut doesnot have time to finda primitiveroot of the primep = 89 that he has chosen.
D. Chaum, I. B. Damgaard and J. van de Graaf, “Multiparty computations ensuring privacy of each party's input and correctness of the result”, in Advances in Cryptology - CRYPTO'87, LNCS 293. Berlin: Springer-Verlag, 1988, pp. 87-119.
T. Matsumoto and H. Imai, “On the Key Predistribution System: A Practical Solution to the Key Distribution Problem”, in Advances in Cryptology–Crypto'87, LNCS 293, Springer-Verlag, pp.185-193, 1987. 10. T. Matsumoto and H. Imai, ...
In M. Wiener, editor, Advances in Cryptology – CRYPTO '99, pages 116–129. Springer-Verlag, 1999. LNCS no. 1666. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC '87, pages 218–229. ACM Press, 1987.
... Advances in Cryptology— Eurocrypt '98, pages 32–46. 329 [FPS99] P. Fouque, G. Poupard, J. Stern. Recovering Keys in Open Networks. In IEEE ITW, 1999. 329 [FS86] A. Fiat, A. Shamir. How to Prove Yourself: Practical Solutions to ...