-The other approach to solve the problem of scale-out introduces a
-structured and organized set of trusted third parties called
-``Certification Authorities'' (CAs). CAs offer verification services to
-all users, adhering to a published set of standard rules and procedures.
-Of course, each CA is free to specify its own standard operating
-procedures, which generally are referred to as ``Certification Practice
-Statement''\footnote{\url{http://en.wikipedia.org/wiki/Certification_Practice_Statement}}
-(CPS) and denotes the rules that the CA adheres to when verifying the
-authenticity of public keys. When the authenticity of a public key has
-been established in accordance to the CA's CPS, it may issue a certificate,
-which is essentially the public key, usually combined with some
-meta-information about the owner of the key, and the CA's cryptographic
-signature by which the CA assures the accuracy of the information contained
-in the certificate. Therefore, if Alice is sufficiently convinced that a
-given CA is doing a proper job of verification in accordance with its
-published CPS and the CPS are sufficiently strict so that Alice feels
-comfortable with the level of assurance they provide, then Alice may
-consider all public keys that that CA has issued certificates for as
-authentic. This reduces the work that Alice has to do to verify $n$~public
-keys from $n$~verifications (one per other user) to just one verification
-(that to verify the authenticity of the CA's public key). Accepting a CA
-as a generally-trusted mediator therefore solves the scaling problem at the
-cost of introducing an actor that magically is more trustworthy.