Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The security of the BoB infrastructure relies heavily on strong cryptographic mechanisms to secure data integrity and data origin authentication. Secure management of the private encryption keys are therefore of utmost importance. This chapter provides an overview of which types of keys are used, and what they are used for.

Metadata

The Metadata, as described hereĀ and MTS4, are secured using both client- and server-side keys. The client-side keys are used for adding, updating and removing metadata pertaining to a participant. The server-side keys are used to sign the Metadata before it is being distributed to the participants, and hence needs to be validated by the receiving party.

...