In this public-key encryption method, which was first proposed by Adi Shamir in 1984, a public key is generated using a unique identifier, like an email address. The sender can use this public key of the receiver and encrypt the data, whereas the receiver can generate the corresponding private key using the third-party server. The mechanism does not require any distribution of the public keys.
| 5 Min Read