-
Notifications
You must be signed in to change notification settings - Fork 6
key compromise
Henk van Cann edited this page Jul 7, 2023
·
1 revision
Basically there are three infrastructures that are included in “key management” systems that must be protected:
- Key pair creation and storage
- Event signing
- Event signature verification So when we say “key compromise” we really mean compromise of one of those three things.
More in the security sections of Universal Identifier Theory