If entities wish to use a public key for encryption or signature verification they must retrieve this key and find out to whom it belongs. If this public key has been certified within a hierarchical PKI, the corresponding certificate must be found. Typically, such a certificate is the last element of a certification path. To verify its validity, the appropriate trust anchor must be found and the certification path must be constructed and verified. In this chapter we explain how this is done.
CITATION STYLE
Buchmann, J. A., Karatsiolis, E., & Wiesmaier, A. (2013). Certification Paths: Retrieval and Validation. In Introduction to Public Key Infrastructures (pp. 125–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_9
Mendeley helps you to discover research relevant for your work.