First, remember that signatures don't use encryption (well, not in the
same way) so that signatures are most certainly allowed in PDF/A (parts 1,
2 and 3).  In PDF/A-1, we don't speak at all about signatures and they are
simply there as defined by PDF 1.4.  However, PDF/A-2 and PDF/A-3 both
have very detailed sections on Digital Signatures and PDF/A, based on the
PAdES (ETSI TS 102778) standard.

Signing PDF/A is VERY IMPORTANT...

Leonard

On 6/27/11 5:20 PM, "1T3XT BVBA" <[email protected]> wrote:

>On 27/06/2011 17:14, mkl wrote:
>> 1T3XT BVBA wrote:
>>> PDF/A excludes the use of encryption algorithms, doesn't it?
>>> Then how exactly would you sign a PDF and keep it conform with PDF/A?
>> You might want to take a look at the PDF/A Competence Center Technical
>>Note
>Interesting!
>I failed to see why one would want to sign a PDF/A document, because
>there's no obligation for PDF/A compliant readers to be able to verify
>the signature.
>But the note made it clear it's possible to sign a PDF/A document anyway.
>Thanks!
>
>--------------------------------------------------------------------------
>----
>All of the data generated in your IT infrastructure is seriously valuable.
>Why? It contains a definitive record of application performance, security
>threats, fraudulent activity, and more. Splunk takes this data and makes
>sense of it. IT sense. And common sense.
>http://p.sf.net/sfu/splunk-d2d-c2
>_______________________________________________
>iText-questions mailing list
>[email protected]
>https://lists.sourceforge.net/lists/listinfo/itext-questions
>
>iText(R) is a registered trademark of 1T3XT BVBA.
>Many questions posted to this list can (and will) be answered with a
>reference to the iText book: http://www.itextpdf.com/book/
>Please check the keywords list before you ask for examples:
>http://itextpdf.com/themes/keywords.php


------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security 
threats, fraudulent activity, and more. Splunk takes this data and makes 
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2d-c2
_______________________________________________
iText-questions mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/itext-questions

iText(R) is a registered trademark of 1T3XT BVBA.
Many questions posted to this list can (and will) be answered with a reference 
to the iText book: http://www.itextpdf.com/book/
Please check the keywords list before you ask for examples: 
http://itextpdf.com/themes/keywords.php

Reply via email to