diff --git a/index.html b/index.html index 590f76b..42cc323 100644 --- a/index.html +++ b/index.html @@ -548,7 +548,144 @@
+This section defines the terms used in this specification. A link to these terms +is included whenever they appear in this specification. +
+ +example.com
, an
+ad-hoc value such as mycorp-level3-access
, or a very
+specific transaction value like 8zF6T8J34qP3mqP
. A signer could
+include a [=domain=] in its digital proof to restrict its use
+to particular target, identified by the specified [=domain=].
+ +A set of parameters that can be used together with a process to independently +verify a proof. For example, a cryptographic public key can be used as a +verification method with respect to a digital signature; in such usage, it +verifies that the signer possessed the associated cryptographic private key. +
++"Verification" and "proof" in this definition are intended to apply broadly. For +example, a cryptographic public key might be used during Diffie-Hellman key +exchange to negotiate a shared symmetric key for encryption. This guarantees the +integrity of the key agreement process. It is thus another type of verification +method, even though descriptions of the process might not use the words +"verification" or "proof." +
++An expression of the relationship between the [=subject=] and a +[=verification method=]. An example of a verification relationship is +[[[#authentication]]]. +
+-This section defines the terms used in this specification. A link to these terms -is included whenever they appear in this specification. -
- -example.com
, an
-ad-hoc value such as mycorp-level3-access
, or a very
-specific transaction value like 8zF6T8J34qP3mqP
. A signer could
-include a domain in its digital proof to restrict its use
-to particular target, identified by the specified domain.
- -A set of parameters that can be used together with a process to independently -verify a proof. For example, a cryptographic public key can be used as a -verification method with respect to a digital signature; in such usage, it -verifies that the signer possessed the associated cryptographic private key. -
--"Verification" and "proof" in this definition are intended to apply broadly. For -example, a cryptographic public key might be used during Diffie-Hellman key -exchange to negotiate a shared symmetric key for encryption. This guarantees the -integrity of the key agreement process. It is thus another type of verification -method, even though descriptions of the process might not use the words -"verification" or "proof." -
--An expression of the relationship between the subject and a -verification method. An example of a verification relationship is -authentication. -
-