Skip to main content

ElGamal Public Key Encryption

  • Reference work entry
Encyclopedia of Cryptography and Security

Synonyms

ElGamal encryption

Related Concepts

Decisional Diffie–Hellman Assumption; ElGamal Decryption; Elliptic Curve Cryptography; E-Voting; Public Key Cryptography; Security Reduction; Threshold Cryptography

Definition

The ElGamal public key encryption scheme is characterized by having as ciphertext, \(({c}_{1},{c}_{2}) := ({g}^{k},m \cdot{y}_{A}^{k})\), which details are explained further on.

Theory

In the ElGamal public key encryption scheme [1] \(\langle g\rangle\) is a finite cyclic group of large enough order. q, (a multiple of) the order of g, denoted as \(\mathrm{ord}(g)\) (not necessarily a prime), is public. In the original ElGamal scheme, \(\langle g\rangle = {Z}_{p}\), p a prime and \(q = p - 1\). Today, q is usually a prime and g a point on an elliptic curve over a finite field or an element from Z p .

If Alice wants to make a public key, she chooses \(a {\in }_{R}{Z}_{q}\) and she computes y A : = g a in the group \(\langle g\rangle\). Her public key will be (g, q, y...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory 31:469–472

    Article  MATH  MathSciNet  Google Scholar 

  2. Jakobsson M (1998) A practical mix. In: Nyberg K (ed) Advances in Cryptology — Eurocrypt ’98, Proceedings. Lecture notes in computer science, vol 1403. Springer, Espoo, Finland, May 31–June 4 1998, pp 448–461

    Google Scholar 

  3. Lipmaa H (2011) On the CCA1-security of ElGamal and Damg\(\dot{\textrm{ a}}\)rd ElGamal. In: Lai X, Yung M, Lin D (eds) Inscrypt 2010. Lecture notes in computer science, vol 6584. Springer, pp 18–35

    Google Scholar 

  4. Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Brassard G (ed) Advances in Cryptology — Crypto ’89, Proceedings. Lecture notes in computer science, vol 435. Springer, Santa Barbara, 20–24 August 1990, pp 239–252

    Google Scholar 

  5. Tsiounis Y, Yung M (1998) The security of ElGamal based encryption. In: Imai H, Zheng Y (eds) Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC’98. Springer, Pacifico Yokohama, Japan, 5–6 February 1998, pp 117–134

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Desmedt, Y. (2011). ElGamal Public Key Encryption. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_318

Download citation

Publish with us

Policies and ethics