Content deleted Content added
No edit summary |
Matt Crypto (talk | contribs) m unlnk |
||
Line 1:
'''ID-based cryptography''' (or '''identity based cryptography''' or '''
This system works by having a trusted third party who has a secret which can be combined with a user's identity information to produce the user's secret key. The third party also produces some public information which is derived from
|