Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Public Key

Handbook of Research on Public Information Technology
In PKI, the public key is a publicly known key used with a corresponding private key to encrypt and decrypt messages.
Published in Chapter:
Federal Public-Key Infrastructure
Ludwig Slusky (California State University–Los Angeles, USA) and Parviz Partow-Navid (California State University–Los Angeles, USA)
Copyright: © 2008 |Pages: 12
DOI: 10.4018/978-1-59904-857-4.ch040
Abstract
All branches of federal government are required to change their business practices to a paperless operation. Privacy and information security are critical for the protection of information shared over networks internally between the U.S. government agencies and externally with nonfederal organizations (businesses; state, local, and foreign governments; academia; etc.) or individuals. The public-key infrastructure (PKI) is the simplest, most widely used architecture for secure data exchange over unsecured networks. It integrates computer hardware and software, cryptography, information and network security, and policies and procedures to facilitate trust in distributed electronic transactions and mitigate the associated risks. Federal PKI (FPKI) is PKI designed for implementation and use by government agencies. Federal PKI research was under way since 1991, and by the end of 2005, the federal PKI included 13 cross-certified federal entities, three approved shared service providers (SSPs; Verisign, Cyber- Trust, National Finance Center/U.S. Department of Agriculture [USDA]), one state, and three foreign countries (Canada, UK, and Australia; Alterman, 2005). Initially envisioned as an interoperability mechanism for federal organizations exclusively, the federal PKI is now positioned for trust interoperability and cross-certification internally among federal agencies and externally with other organizations.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Improved Cross-Layer Detection and Prevention of Sinkhole Attack in WSN
Two keys are generated in public key cryptography. The public key is broadcasted by the source node to the nodes of the network. The nodes use the same to encrypt the messages before transmission. The source decrypts the received message using the private key.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization
The publicly distributed key that if combined with a private key (derived mathematically from the public key), can be used to effectively encrypt messages and digital signatures.
Full Text Chapter Download: US $37.50 Add to Cart
Security of Identity-Based Encryption Algorithms
The Public key is one of the keys used in public key encryption algorithms. This key is made available publicly.
Full Text Chapter Download: US $37.50 Add to Cart
Mobile Agent Authentication and Authorization in E-Commerce
The publicly distributed key that if combined with a private key (derived mathematically from the public key), can be used to effectively encrypt messages and digital signatures.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR