Suppose in a network, the identity of users is their public key, which is generated based on the ECDSA algorithm. That is, to create a valid identity, a user must generate an ECDSA public key and then send it to the network administrator for validation. Then, the network administrator needs to know if the user followed all the ECDSA key generation steps correctly to ensure that the user's public key is a valid ECDSA public key.
The question is if the administrator is able to do this confirmation? and how to do it?
I propose here my solution, although I am not sure if the approach is Ok.
Assume a user generates a fake public key claiming it is generated according to the ECDSA algorithm.
He must send the key to the network administrator for verification.
The committee then to verify the key sends a text to the user and requests him to sign in.
After receiving the signed text verifies the signature using the user's public key.
If the result of signature verification is true, it means that the public key is a correct public key, otherwise the user's public key is rejected as an invalid public key which is not generated based on the ECDSA algorithm.