A method and system for generating asymmetric crypto-keys usable by
network users to transform messages is provided. The system includes a
first network station associated with a user, a second network station
associated with a trusted entity, and a third network station associated
with a sponsor. The trusted entity authorizes the sponsor to generate the
asymmetric crypto-key. The sponsor generates a symmetric crypto-key and
associated user identification. The sponsor both stores the generated
symmetric crypto-key and the associated user identification and transmits
the symmetric crypto-key and the associated user identification to the
trusted entity. The trusted entity then distributes the symmetric
crypto-key and user identification to the user. The user then presents
the user identification to the sponsor. The sponsor then generates a
challenge and transforms the challenge with the stored symmetric
crypto-key. The sponsor transmits the transformed challenge to the user.
The user then further transforms the challenge and transmits the further
transformed challenge back to the sponsor. In response to receipt of the
further transformed challenge, the sponsor then generates the asymmetric
crypto-key.