Skip to main content

Keys distribution for asymmetric cryptographic systems

  • Conference paper
Information Processing and Security Systems
  • 524 Accesses

Abstract

The article discusses issues related to security policies which can emerge in the process of generating qualified certificates. There is presented a system enabling generation of qualified keys for asymmetric cryptographic system without the necessity of appearing in person of the person or body applying for the certificate at the seat of certification authority.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

4 References

  1. Act of 18 September 2001 r. on electronic signature, The Journal of Laws 2001, No 130, item 1450, Poland

    Google Scholar 

  2. Act of 22 January 1999 r. on protection of confidential information, The Journal of Laws 1999, No 11, item 95, Poland

    Google Scholar 

  3. The way of generation of electronic documents with time marker, Patent application P 366965 of 05.04.2004, The Patent Office of the Republic of Poland

    Google Scholar 

  4. The way of generation of keys to asymmetric cryptographic systems at the client's, Patent application P368491 of 14.06.2004, The Patent Office of the Republic of Poland

    Google Scholar 

  5. The way of obtaining keys to asymmetric cryptographic systems, patent application P 367587 of 28.04.2004, The Patent Office of the Republic of Poland

    Google Scholar 

  6. M. Bellare and P. Rogaway Entity Authentication and key distribution, Advances in Cryptology-Crypto 93 Proceedings, Lecture Notes in Computer Science Vol. 773, D. Stinson ed., Springer-Verlag, 1994

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science+Business Media, Inc.

About this paper

Cite this paper

Kuriata, E. (2005). Keys distribution for asymmetric cryptographic systems. In: Saeed, K., Pejaś, J. (eds) Information Processing and Security Systems. Springer, Boston, MA. https://doi.org/10.1007/0-387-26325-X_15

Download citation

  • DOI: https://doi.org/10.1007/0-387-26325-X_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-25091-5

  • Online ISBN: 978-0-387-26325-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics