Some X-KISS Usage Scenarios
Extracting key info
Alice does not know Bob’s key, but…
…via X-KISS she can retrieve the key
in X-KISS she can specify which format she can handle
encrypts and sends the encrypted messsage to Bob
Extending
KeyInfo
Alice signs a document and sends it to Bob, but…
…she sends only minimal data on the key
Bob retrieves the additional info for validation…
…and sends to Carol who can check everything
Document signature
Bob receives Alice’s signed message
Bob’s client can chek the signature, but…
…does not know if the key info corresponds to Alice’s id
Bob can check this through X-KISS
Ivan Herman
, W3C Head of Offices
© 1994-2004, W3C (MIT,ERCIM,Keio)
$Date: 2004/03/11 12:07:24 $
20 (20)