Skip to content
Henk van Cann edited this page Jul 7, 2023 · 1 revision

Definition

Basically there are three infrastructures that are included in “key management” systems that must be protected:

  • Key pair creation and storage
  • Event signing
  • Event signature verification So when we say “key compromise” we really mean compromise of one of those three things.

More information

More in the security sections of Universal Identifier Theory

Clone this wiki locally