Open Web PortalSupport
Globe Icon
  • Products

    image
    Electronic Signature
    Send out contracts in seconds. Confidently, securely and intuitively.
    Read more >
    image
    Digital Identifying
    Remotely verify identities. Without in-person id check, or copies.
    Read more >
  • Solutions

    image
    Web Portal
    Complete web portal for electronic signatures, digital identification and much more.
    Open portal >
    image
    API
    Easily integrate Signhost into your own system with our REST API.
    Read more >
    image
    Mobile App
    Sign and send documents quickly, easily, and securely with the Signhost app.
    Read more >
  • Integration

    image
    API
    Easily integrate Signhost into your own system with our REST API.
    Read more >
    image
    Third-Party Integrations
    Connect with popular software solutions such as AFAS, Salesforce, and more.
    Read more >
  • Pricing

    image
    Electronic Signature
    See pricing for electronic signing with Signhost.
    See pricing >
  • Insights

Pricing
See and compare various packages and prices for Electronic Signing or ID Proof by Signhost.
image
Electronic Signature
See pricing for electronic signing with Signhost.
See pricing >
image

What Is PKI?

PKI means public key infrastructure, which enables secure communications and transactions online. Find out how it works on this page.

PKI stands for public key infrastructure, which is a framework that provides security measures for communications and transactions online. It involves the creation and management of encrypted digital certificates, allowing for the authentication of users’ identities. Suitable for a range of use cases, PKI is often used in creating electronic signatures and verifying users and devices on a network.

Features of PKI

Digital certificates

Digital certificates use a digital signature to bind a public key with an identity. This includes information such as a person's name or an organization’s details.

This certificate verifies that the public key belongs to a specific individual, device, or service.

Certificate authority (CA)

A CA is a trusted entity that issues digital certificates. The CA verifies the certificate applicant's credentials before issuing a certificate, ensuring that the public key contained in the certificate belongs to the person, organization, device or service it claims to represent.

Registration Authority (RA)

The RA verifies requests for digital certificates, instructing the CA to issue the certificate if the requesting party meets the requirements.

Public and private keys

Within each request, there is a matched set of keys where the public key is shared openly, and the private key is kept secret. The public key encrypts data that only the corresponding private key can decrypt.

Certificate revocation list (CRL)

The CA keeps a list of certificates that it has revoked before their scheduled expiration date. Any request relating to a certificate on the list will be denied.

How PKI works

PKI enables users to encrypt and decrypt messages using the public and private keys, which means that only the intended recipient is able to see the information included in the message. It also enables the use of electronic signatures. With PKI, an organization can verify the authenticity and integrity of the user’s signature.

It uses a complex algorithm to encrypt and decrypt the data sent from one party to another in a process referred to as asymmetric encryption.

Benefits of PKI

  • Enhanced security for electronic transactions, protecting against unauthorized access and data breaches.

  • Establishes a digital trust framework that allows entities to ascertain the authenticity of certificates issued by CAs.

  • Promotes data integrity, proving that it has not been altered after transmission.

  • Prevents the sender of a message from denying the authenticity of the message they sent or signed.

Uses for PKI

Electronic signatures

Allows organizations to request secure, legally binding qualified electronic signatures (QES). This provides the same assurance as a wet pen and ink signature, but with the benefits of greater convenience and efficiency.

Authentication

When organizations need to verify the identity of users, customers, devices and servers, utilizing PKI helps to maintain security and reduce the risks of wrongdoing and fraud.

Secure email communications

When companies want to send sensitive information by email, PKI can encrypt the messages and ensure that there is no unauthorized access.

*Disclaimer: This content does not constitute legal advice. The suitability, enforceability or admissibility of electronic documents will likely depend on many factors such as the country or state where you operate, the country or state where the electronic document will be distributed as well as the type of electronic document involved. Appropriate legal counsel should be consulted to analyze any potential legal implications and questions related to the use of electronic documents.