nAlice
has to implicitly trust some set of keys
nOnce
she does that, those keys can introduce others to her.
nIn
the model used by SSL/TLS, CAs are arranged in a hierarchy
nAlice,
and everyone else, trusts one or more “root CA” that live at the top of the
tree
nOther
models work differently (next class)
n