Advertisement

Keys distribution for asymmetric cryptographic systems

  • Eugeniusz Kuriata
Conference paper

Abstract

The article discusses issues related to security policies which can emerge in the process of generating qualified certificates. There is presented a system enabling generation of qualified keys for asymmetric cryptographic system without the necessity of appearing in person of the person or body applying for the certificate at the seat of certification authority.

Keywords

Cryptography security e-document 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4 References

  1. [1]
    Act of 18 September 2001 r. on electronic signature, The Journal of Laws 2001, No 130, item 1450, PolandGoogle Scholar
  2. [2]
    Act of 22 January 1999 r. on protection of confidential information, The Journal of Laws 1999, No 11, item 95, PolandGoogle Scholar
  3. [3]
    The way of generation of electronic documents with time marker, Patent application P 366965 of 05.04.2004, The Patent Office of the Republic of PolandGoogle Scholar
  4. [4]
    The way of generation of keys to asymmetric cryptographic systems at the client's, Patent application P368491 of 14.06.2004, The Patent Office of the Republic of PolandGoogle Scholar
  5. [5]
    The way of obtaining keys to asymmetric cryptographic systems, patent application P 367587 of 28.04.2004, The Patent Office of the Republic of PolandGoogle Scholar
  6. [6]
    M. Bellare and P. Rogaway Entity Authentication and key distribution, Advances in Cryptology-Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, D. Stinson ed., Springer-Verlag, 1994Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  • Eugeniusz Kuriata
    • 1
  1. 1.Institute of Control and Computation EngineeringUniversity of Zielona GóraZielona Góra

Personalised recommendations