ABSTRACT

To make reasoned access-control decisions in a digital world, we need to explore in more depth how statements are signed and authenticated digitally. The basis for digital signatures rests on cryptographic keys and cryptographic hash functions in general, and on public-key cryptography in particular. Digital authentication using public-key infrastructure (PKI) is well suited for authentication in distributed environments such as the Internet.