answersLogoWhite

0


Best Answer

PKI or Public Key Infrastructure

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: The use of certificate authorities to associate public keys with certain users is known as?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What will the certificate of public enemies be?

The certificate for Public enemies is 12a


What best describes the difference between public authorities and state agencies?

Public authorities have more flexibility to operate like a business.


What is able to identify users with public key infrastructure?

I'm not certain of the intent of the question but it sounds like what is being asked is how you can know the actual identity of someone from their public key - i.e. how you can know that the public key really belongs to the person it purports to belong to. PKI (public key infrastructure) is one way to establish with reasonable certainty that a key really belongs to the entity that is claimed. PKI uses a system of Certificate Authorities (CA) and Registration Authorities (RA). At the top of the chain is the Registration Authority that everyone trusts. Users register their public keys with the RA. CA's also register their certificates withe the RA along with proof that they are who they say they are. CA's are repositories of public keys that the public can access. They sign the keys with their own certificates vouching for the identity of the public key owner. The identity of the CA may, in turn, be vouched for by an RA or higher CA who sign the certificate of that particular CA.


What statement best describes the difference between public authorities and state agencies?

Public authorities have more flexibility to operate like a business.


How do you sign your name with associate's degree?

Either "John Q. Public, A.A." or "John Q. Public, A.S.", depending upon whether you have an Associate in Arts degree or an Associate in Science degree.


How can one get a PKI certificate?

One can receive a PKI certificate, or a public-key infrastructure certificate, is by digitally signing and publishing the public key bound to a given user.


What is a APS Degree?

associate of public service degree!


What is the name for the government authorities to protect the public?

Police power


What statement best describes an argument against public authorities?

An argument against public authorities is that they can be easily influenced by powerful interests, leading to corruption and the prioritization of private gain over public welfare. Furthermore, public authorities may lack transparency and accountability, making it difficult for citizens to hold them responsible for their actions.


Do Hawkers need a peddlers certificate?

In most places, hawkers do need a peddler's certificate or license to legally sell goods or services in public spaces. This is typically required by local government authorities to regulate and monitor street vendors. The specific requirements and processes for obtaining a peddler's certificate may vary depending on the location.


Can a death certificate be private?

No, a death certificate is a public certification that someone has died. Some information on a death certificate may be kept private.


How does embedding a public key in a digital certificate protect it from impersonators?

Embedding the public key in a digital certificate protects it from impersonators by associating and binding a user's identity to the public key. A digital certificate is the user's public key that has been "digitally signed" by a trustworthy source trusted to sign it. And, instead of "trustworthy" you could use the word: reputable.