Can Asymmetric encryption be used instead of modern authentication strategy?

Assuming that I have a way to associate a combination of public private key encryption with real people/user. The private key is stored on the device of the user.

User have to communicate with some web service on multiple ho… Continue reading Can Asymmetric encryption be used instead of modern authentication strategy?