| http://www.w3.org/ns/prov#value | - A method as in claim 10, whereinthe public key comprises two numbers, g and h, in Gq, and a hash-function H; the secret key comprises the discrete logarithm, in Zq, of h with respect to g; and the correspondence between a digital certificate and a vector of numbers with respect to the public key is specified according to gr =(hm)c a or, alternatively, according to gr =hm(a)c, wherea is a number in
|