Map
Index
Random
Help
th

QuoteRef: shamA_1984




Group:
security
Topic:
authentication

Reference

Shamir, A., "Identity-based cryptosystems and signature schemes", in Blakley, G.R., Chaum, D. (ed.), Advances in Cryptology: Proceedings of CRYPTO 84, Springer-Verlag, LNCS 196, 1984, pp. . Google

Quotations
47 ;;Quote: an identity-based cryptosystem uses a trusted key generation computer to generate a public key/private key pair; the public key is the user's network identity for encryption and digital signature

Related Topics up

Group: security   (23 topics, 874 quotes)
Topic: authentication (93 items)

Collected barberCB 2/04
Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.