A paradoxical'' identity-based signature scheme ...

30 downloads 87721 Views 667KB Size Report
Each security device stores its secret authentication number, an RSA-like signature computed by an authority from the device identity. Any transaction between a ...