In this paper we introduce a novel type … other's signatures without exchanging private or public keys, … the existence of trusted key generation computers, whose … network. … Instead of generating a random pair of public/secret … the user chooses his name and network address … telephone number can be used … provided that it uniquely identifies the user in … [p. 48] The corresponding secret key is computed by … [p. 49] At this stage we have concrete implementation … we encourage the reader to look for such …
Google-1
Google-2
Copyright clearance needed for quotation.