Map
Index
Random
Help
th

Quote: an identity-based cryptosystem uses a trusted key generation computer to generate a public key/private key pair; the public key is the user's network identity for encryption and digital signature

QuoteRef: shamA_1984 , p. 47



Group:
security
Topic:
authentication

Quotation Skeleton

In this paper we introduce a novel type … other's signatures without exchanging private or public keys, … the existence of trusted key generation computers, whose … network. … Instead of generating a random pair of public/secret … the user chooses his name and network address … telephone number can be used … provided that it uniquely identifies the user in … [p. 48] The corresponding secret key is computed by … [p. 49] At this stage we have concrete implementation … we encourage the reader to look for such …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Group: security   (23 topics, 874 quotes)
Topic: authentication (93 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.