A fundamental method of identification is the use of asymmetric encryption and pairs of public and private . It is considered that only keys the Subject knows his private key, and since the public key is uniquely tied to the private key (one unique key corresponds to a single unique private
key), the public key is the Subject's identifier. This method has long been introduced into the business through the use of EDS.