2.I.4G

Coding and Cryptography
Part II, 2007

Briefly explain how and why a signature scheme is used. Describe the El Gamal scheme.