Keys distribution for asymmetric cryptographic systems
The article discusses issues related to security policies which can emerge in the process of generating qualified certificates. There is presented a system enabling generation of qualified keys for asymmetric cryptographic system without the necessity of appearing in person of the person or body applying for the certificate at the seat of certification authority.
KeywordsCryptography security e-document
Unable to display preview. Download preview PDF.
- Act of 18 September 2001 r. on electronic signature, The Journal of Laws 2001, No 130, item 1450, PolandGoogle Scholar
- Act of 22 January 1999 r. on protection of confidential information, The Journal of Laws 1999, No 11, item 95, PolandGoogle Scholar
- The way of generation of electronic documents with time marker, Patent application P 366965 of 05.04.2004, The Patent Office of the Republic of PolandGoogle Scholar
- The way of generation of keys to asymmetric cryptographic systems at the client's, Patent application P368491 of 14.06.2004, The Patent Office of the Republic of PolandGoogle Scholar
- The way of obtaining keys to asymmetric cryptographic systems, patent application P 367587 of 28.04.2004, The Patent Office of the Republic of PolandGoogle Scholar
- M. Bellare and P. Rogaway Entity Authentication and key distribution, Advances in Cryptology-Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, D. Stinson ed., Springer-Verlag, 1994Google Scholar