The University of SydneyPage 51–when Alice wants Bob’s public key:–gets Bob’s certificate (Bob or elsewhere).–apply CA’s public key to Bob’s certificate, get Bob’s public keyBob’s publickey K B+digitalsignature(decrypt)CA publickey K CA+K B+Certification authorities
8-51Security