We introduce the notion, and give two examples, … to be authenticated by other users. The trick … the certificate is "embedded" in the public key … to reduce the amount of storage and computations … unknown to the authority. This makes the difference … that secret keys are computed (and therefore known …
Google-1
Google-2
Copyright clearance needed for quotation.