Certification Paths: Retrieval and Validation

  • Buchmann J
  • Karatsiolis E
  • Wiesmaier A
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

If entities wish to use a public key for encryption or signature verification they must retrieve this key and find out to whom it belongs. If this public key has been certified within a hierarchical PKI, the corresponding certificate must be found. Typically, such a certificate is the last element of a certification path. To verify its validity, the appropriate trust anchor must be found and the certification path must be constructed and verified. In this chapter we explain how this is done.

Cite

CITATION STYLE

APA

Buchmann, J. A., Karatsiolis, E., & Wiesmaier, A. (2013). Certification Paths: Retrieval and Validation. In Introduction to Public Key Infrastructures (pp. 125–141). Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free