Abstract

This document identifies the impacts to a public key infrastructure (PKI) created by the presence of key recovery, as well as elements in the public key infrastructure needed to support or accommodate key recovery. The key recovery infrastructure includes key recovery techniques based both on (1) encapsulation of key recovery information and (2) key backup. The data applications covered by the study include interactive communication sessions, store-and-forward communications, and data storage. The document identifies and lists elements of existing PKI that support or accommodate key recovery, and it identifies and lists needed changes to PKI to support or accommodate key recovery.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.