| http://www.w3.org/ns/prov#value | - A digital signature employing the El-Gamal algorithm utilizes the private key of the signer, a secret fresh random number, and generally the result of applying a secure hash function (such as SHA-1 or RIPEMD) to one or more data items, such as documents, files, programs, or keys (which for simplicity are referred to hereinafter as documents") to manifest the signer's origination, approval, or cer
|