Use Case:<br> Server Authentication

Due to its public-key encryption scheme, it can be utilized to provide authentication, for protocols such as SSH, without requiring central identity servers.

This is helpful to maintain critical infrastructure that is not necessarily connected to the Internet. A certificate scheme, such as SSH certificates or X.509 certificates can be utilized for key management.