Public-Key Infrastructures

  • Johannes A. Buchmann
Part of the Undergraduate Texts in Mathematics book series (UTM)


Since public keys in asymmetric cryptosystems need not be kept secret, key management in those systems is simpler than in symmetric schemes. Private keys, however, must be kept secret. Also, public keys must be protected from falsification and abuse. Therefore, appropriate public-key infrastructures (PKI) must be set up. They are responsible for key distribution and management. In this chapter, we describe how such public-key infrastructures work.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media New York 2004

Authors and Affiliations

  • Johannes A. Buchmann
    • 1
  1. 1.Department of Computer ScienceTechnical UniversityDarmstadtGermany

Personalised recommendations