Group: security
Topic: authentication
| |
Reference
Shamir, A.,
"Identity-based cryptosystems and signature schemes", in Blakley, G.R., Chaum, D. (ed.),
Advances in Cryptology: Proceedings of CRYPTO 84, Springer-Verlag, LNCS 196, 1984, pp. .
Google
Quotations
47 ;;Quote: an identity-based cryptosystem uses a trusted key generation computer to generate a public key/private key pair; the public key is the user's network identity for encryption and digital signature
|
Related Topics
Group: security (23 topics, 874 quotes)
Topic: authentication (93 items)
|