3.I.4J

Coding and Cryptography
Part II, 2005

Briefly explain how and why a signature scheme is used. Describe the el Gamal scheme.