@techreport{adams-notary-01, number = {draft-adams-notary-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-adams-notary/01/}, author = {Dr. Carlisle Adams and Robert Zuccherato}, title = {{Notary Protocols}}, pagetotal = 12, year = 1998, month = feb, day = 27, abstract = {This document describes a general notary service and the protocols to be used when communicating with it. The Notary Authority is a Trusted Third Party (TTP) that can be used as one component in building reliable non-repudiation services (see {[}ISONR{]}). Useful Notary Authority responsibilities in a PKI are to validate signatures and to provide up- to-date information regarding the status of certificates. We give examples of how to use the notary to extend the lifetime of a signature beyond key expiry or revocation and to query the notary regarding the status of a certificate.}, }