Abstract
Since public keys in asymmetric cryptosystems need not be kept secret, key management in those systems is simpler than in symmetric schemes. Private keys, however, must be kept secret. Also, public keys must be protected from falsification and abuse. Therefore, appropriate public-key infrastructures (PKI) must be set up. They are responsible for key distribution and management. In this chapter, we describe how such public-key infrastructures work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag New York, Inc.
About this chapter
Cite this chapter
Buchmann, J.A. (2001). Public-Key Infrastructures. In: Introduction to Cryptography. Undergraduate Texts in Mathematics. Springer, New York, NY. https://doi.org/10.1007/978-1-4684-0496-8_14
Download citation
DOI: https://doi.org/10.1007/978-1-4684-0496-8_14
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4684-0498-2
Online ISBN: 978-1-4684-0496-8
eBook Packages: Springer Book Archive