Page 245

The University of SydneyPage 51–when Alice wants Bob’s public key:–gets Bob’s certificate (Bob or elsewhere).–apply CA’s public key to Bob’s certificate, get Bob’s public keyBob’s publickey K B+digitalsignature(decrypt)CA publickey K CA+K B+Certification authorities

8-51Security