Public-key cryptography Cleverly use Digital Signature to authenticate to a party (This will be covered later)Public-key Cryptography Cleverly use Digital Signature to authenticate to a party. (This will be covered later) Topic 3: User Authentication 182/3/2021