This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Key signing party" – news · newspapers · books · scholar · JSTOR(March 2015) (Learn how and when to remove this message)
In public-key cryptography, a key signing party is an event at which people present their public keys to others in person, who, if they are confident the key actually belongs to the person who claims it, digitally sign the certificate containing that public key and the person's name, etc.[1] Key signing parties are common within the PGP and GNU Privacy Guard community, as the PGP public key infrastructure does not depend on a central key certifying authority, but to a distributed web of trust approach. Key signing parties are a way to strengthen the web of trust. Participants at a key signing party are expected to present adequate identity documents.[2]
Although PGP keys are generally used with personal computers for Internet-related applications, key signing parties themselves generally do not involve computers, since that would give adversaries increased opportunities for subterfuge. Rather, participants write down a string of letters and numbers, called a public key fingerprint, which represents their key. The fingerprint is created by a cryptographic hash function, which condenses the public key down to a string which is shorter and more manageable. Participants exchange these fingerprints as they verify each other's identification. Then, after the party, they obtain the public keys corresponding to the fingerprints they received and digitally sign them.[3]
^The Keysigning Party HOWTO https://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html
^Section §2.1 of NIST Special Publication 800-57 Part 3
Revision 1
Recommendation for
Key Management http://dx.doi.org/10.6028/NIST.SP.800-57pt3r1
^Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing (2015-09-01). "Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography". Optics and Lasers in Engineering. 72: 12–17. Bibcode:2015OptLE..72...12Z. doi:10.1016/j.optlaseng.2015.03.024. ISSN 0143-8166.
public-key cryptography, a keysigningparty is an event at which people present their public keys to others in person, who, if they are confident the key actually...
organize keysigningparties, where many people meet in person to verify each other's identity using some printed certificate of identity and then sign each...
Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered...
not legally sign every message he or she sends. Only when both parties come to an agreement do they sign a contract with their signingkeys, and only then...
there are key signing keys (KSK) which are used to sign other DNSKEY records containing zone signingkeys (ZSK), which are used to sign other records. Since...
done at keysigningparties. OpenPGP-compliant implementations also include a vote counting scheme which can be used to determine which public key – owner...
others (relying parties) to rely upon signatures or on assertions made about the private key that corresponds to the certified public key. A CA acts as...
fingerprints are often used to assist in this process (e.g., at key-signingparties). In systems such as CGA or SFS and most cryptographic peer-to-peer...
practical cryptography such as the Tor anonymity network, I2P, Freenet, keysigningparties, disk encryption and virtual private networks to the general public...
9.1. Free and open-source software portal Acoustic cryptanalysis Keysigningparty Off-the-Record Messaging – also known as OTR OpenPGP card – a smartcard...
person and the public key belong together. A keysigningparty is one way of combining a get-together with some certificate signing. Nonetheless, doubt...
public authentication of public key information is the web-of-trust scheme, which uses self-signed certificates and third-party attestations of those certificates...
logged in as admin. The tokens can be signed by one party's private key (usually the server's) so that any party can subsequently verify whether the token...
of music and dress. The KeyParty label went on to sign bands like Aliene Ma'riage, Noir Fleurir and Missalina Rei. KeyParty was eventually incorporated...
the pound key.) In American English, the term "pound sign" usually refers to the symbol # (number sign), and the corresponding telephone key is called...
the tags used are: v (required), version a (required), signing algorithm d (required), Signing Domain Identifier (SDID) s (required), selector c (optional)...
can use the included public key to communicate securely with the certificate's subject. In email encryption, code signing, and e-signature systems, a...
USA Keyword Services Platform Keysigningparty, an event where people verify each other's digital cryptographic keys Solubility product constant (Ksp);...
keys, with the tenure key and the popular vote majority key both replaced by the party mandate key and the foreign/military failure and success keys being...