Content deleted Content added
No edit summary |
No edit summary |
||
Line 1:
'''ID-based
This system works by having a trusted third party who has a secret which can be combined with a user's identity information to produce the user's secret key. The third party also produces some public information which is derived from
|