An organization wants to allow a certificate authority to gain access to the encrypted data and
create digital signatures on behalf of the user. The data is encrypted using the public key from a
user’s certificate. Which of the following processes fulfills the above requirements?
A.
Key escrow
B.
Key storage
C.
Key revocation
D.
Key recovery
Explanation:
Key escrow allows the certificate authority (CA) to gain access to all the information
that is encrypted using the public key from a user’s
certificate, as well as create digital signatures on behalf of the user.