Kari generates a key the same way, using
access-gen-elisa.n3
.
He gives to Alan via some secure channel
Alan signs it: (Alan-2: "Kari is AC rep of Elisa")
cwm access-elisa.public access-master.private access-sign-member-cert.n3 \ --think --purge --with "Elisa" > access-eliza.cert
Here, Alan uses the private key which he (alone) has access to and the
public key which Kari gave him. access-sign-member-cert.n3
is a
rule file which does the signing. It contains, in essence:
{ ?memberName is os:argv of "1". ?memberPublicKey a acc:MemberKey. { ?memberPublicKey a acc:MemberKey; acc:authorityName ?memberName; acc:junk "327462sjsdfjsakdhfkjsafd32164321" } log:n3String ?signedString. ?kp a acc:MasterKeyPair. ?k a acc:MasterKey. ([is crypto:md5 of ?signedString] ?kp) crypto:sign ?signature } => { ?signedString acc:endorsement [acc:signature ?signature; acc:key ?k] } .
11 of 18 |