LogoLogo
  • Welcome to Blerify's docs
  • Blerify Overview
    • User Centric Identity
      • Introduction
      • ID Wallet
      • Digital Credentials
      • Point of Verification (POV)
        • How Does a POV Work in Blerify?
      • Verification Process
    • Quantum-Resistant Cryptography
  • Developers
    • API Documentation
      • Access Token Generation
      • Issuing Verifiable Credentials with the Blerify API
      • Issuing ISO mDL with the Blerify API
    • Point of Verification
      • POVs Creation
      • POV Result
      • POVs Creation via API
    • Versions & Releases
      • Web Portal
        • Web Portal Release 1.5
        • Web Portal Release 1.6
        • Web Portal Release 1.7
      • Blerify APP
        • APP Versión 3.19.0 (386)
        • APP Versión: 3.27.0
        • APP Versión: 3.36.1
  • PRODUCTS
    • Vouchers
      • Orchestration
      • Issuer
      • Redeemption
    • Digital Credentials
      • Issue
        • Licenses
          • ISO/IEC 18013-5 Standard
          • Blerify and ISO/IEC 18013-5
          • Blerify Architecture
        • Verifiable Credentials W3C-VC
        • Benefits, discounts, promotions
      • Verify
        • Web Log In
        • In-Person Access
        • Check Out Experience
        • From Another App
    • Post Quantum Certificates
      • Request
      • Revocation
      • Verify
    • Wallet SDK
  • Resources In-Depth
    • DID Method
      • DID Method did:lac1
      • DID Controller
    • Decentralized Root of Trust
      • Blerify’s Smart-Contract-Based Root of Trust
Powered by GitBook
LogoLogo

Blerify.com

  • Blerify.com
On this page
Export as PDF
  1. PRODUCTS
  2. Post Quantum Certificates

Verify

Verifying a post-quantum certificate involves a series of steps to ensure its authenticity, integrity, and validity. Here's a detailed explanation of the process.

1. Certificate Structure and Components

A post-quantum certificate typically includes:

  • Public Key: Generated using post-quantum cryptographic algorithms.

  • Digital Signature: Created using a post-quantum signature scheme.

  • Metadata: Information such as issuer details, validity period, and usage constraints.

  • Extensions: Additional data, such as key usage policies or revocation status.

2. Steps to Verify a Post-Quantum Certificate

a. Validate the Certificate Chain

  • Verify that the certificate is issued by a trusted Certificate Authority (CA) using post-quantum cryptographic methods.

  • Check the entire certificate chain, ensuring that each intermediate and root certificate is valid and trusted.

b. Verify the Digital Signature

  • Use the issuer's public key (also post-quantum) to verify the digital signature on the certificate.

  • Ensure the signature was generated using a post-quantum algorithm (e.g., CRYSTALS-Dilithium, SPHINCS+, or Falcon).

c. Check the Validity Period

  • Confirm that the certificate is within its validity period (not expired or not yet active).

d. Verify Revocation Status

  • Check the certificate against a Certificate Revocation List (CRL) or use an Online Certificate Status Protocol (OCSP) to ensure it has not been revoked.

  • For post-quantum systems, this step may involve querying a quantum-resistant revocation database.

e. Validate Key Usage

  • Ensure the certificate is being used for its intended purpose (e.g., encryption, signing, or authentication) as specified in the key usage extensions.

f. Verify the Integrity of the Certificate

  • Ensure that the certificate has not been tampered with by recalculating and comparing its hash or using other integrity-checking mechanisms.

3. Tools and Protocols for Verification

  • Post-Quantum Cryptographic Libraries: Use libraries like Open Quantum Safe (OQS) or others that support post-quantum algorithms.

  • Trusted CA Infrastructure: Ensure the CA issuing the certificate is using post-quantum standards.

  • Revocation Services: Use quantum-resistant revocation mechanisms, such as CRLs or OCSP, updated for post-quantum environments.

4. Example Workflow for Verification

  1. Receive the Certificate: Obtain the post-quantum certificate from the entity presenting it.

  2. Extract Public Key and Metadata: Parse the certificate to retrieve the public key and other details.

  3. Verify the Signature: Use the issuer's public key to validate the certificate's signature.

  4. Check Validity and Revocation: Ensure the certificate is valid and not revoked.

  5. Confirm Key Usage: Validate that the certificate is being used appropriately.

  6. Final Validation: If all checks pass, the certificate is considered verified.

5. Challenges in Post-Quantum Certificate Verification

  • Algorithm Transition: Ensuring compatibility between traditional and post-quantum systems during the transition phase.

  • Performance: Post-quantum algorithms may require more computational resources, impacting verification speed.

  • Standardization: Waiting for finalization of post-quantum standards by organizations like NIST.

PreviousRevocationNextWallet SDK

Last updated 4 months ago