
Public Key Infrastructure (PKI) is the solution to
these problems. By mapping public key materials to
abstract entities in a certificate, participants in the net-
work can always rely on the authenticity of their com-
munication partners. This requires a root of trust—a
central authority—from which all certificates are de-
rived. In the case of CBDC, this would be the central
bank.
Trusting these derived certificates is a result of
users trusting the central bank. For that, the central
bank must have proper processes in place to ensure
a secure certificate life cycle. This entails handling
Certificate Signing Requests (CSR), rights and roles,
and organisational procedures. RFC 3647 (Ford et al.,
2003) provides a good overview of key considerations
for designing a PKI.
Focusing on CBDC, this paper explores PKI de-
sign decisions, authenticated entities requiring certifi-
cates, and how a seamless certificate rollover can be
handled.
2 RELATED WORK
The literature has already acknowledged the need
for robust and scalable Public Key Infrastructure for
CBDC and other digital asset systems.
Several publications (Chu et al., 2022; Christodor-
escu et al., 2020; Zhang, 2024; Yang et al., 2022)
highlight the use of PKI for offline payments. The
core idea is that wallets carry certificates signed by an
authority, e.g. the central bank. These can be used for
mutual authentication between a pair of wallets before
or during a transaction. This establishes trust in an
offline scenario. Illegitimate wallets are consequently
excluded from the system and cannot inject counter-
feit money. As Chu et al. (2022) summarize, a PKI
“allows safe transactions even though the certificate
authority is offline, since a certificate states whether
the counterpart is a trusted user”.
Takaragi et al. (2023) investigate the role PKI
plays for Know-your-customer (KYC) checks. The
authors develop a privacy-enhanced PKI by which a
“financial institution verifies the identity of a prospec-
tive customer,” based on the national ID, while simul-
taneously protecting the customer’s personal informa-
tion.
According to Han et al. (2019), a PKI is a core
ingredient for the regulatory layer of a CBDC. Their
goal is “the supervision of objects such as banks and
third parties in network layer and users and transac-
tion in user layer.” Similarly, Zhang (2024) writes
that the role of PKI is “maintaining trust within the
network of entities authorized to operate the CBDC
system”.
Our previous research (Hupel and Rafiee, 2024)
identifies PKI as an instrumental part of any CBDC
ecosystem. In particular, we have evaluated the vari-
ous cryptographic keys and their algorithms involved,
to understand how they are affected by the migra-
tion to post-quantum cryptography. This is echoed
by Zhang, who explains that “the PKI infrastruc-
ture adopted by the central bank should be quantum
ready” (Zhang, 2024).
In the related field of Distributed Ledger Technol-
ogy (DLT), there is literature outlining the use of PKI
for operating permissioned ledgers, i.e., where access
control limits the participation in the system. For ex-
ample, Hyperledger Fabric, uses PKI for “signature
generation, verification, and authentication” (Camp-
bell, 2019). Pal et al. (2021) survey some PKI strate-
gies for major blockchain protocols.
The ISO has published Technical Report (TR)
24374, entitled “Security information for PKI in
blockchain and DLT implementations”. It discusses
“the impact of different types of key management pro-
cesses that are required for PKI implementations in
Blockchain and DLT projects” (International Organi-
zation for Standardization, 2023).
3 PARTICIPANTS IN A CBDC
ECOSYSTEM
For this paper, we assume a CBDC system with the
following characteristics:
• a two-tier distribution model, i.e., the central
bank manages the supply of money and commer-
cial banks are responsible for distributing money
to individuals and businesses;
1
• unbanked individuals are included, i.e., people
without a formal bank account can get access to
CBDC, with notable groups being rural citizens
without access to a bank branch, children, and
tourists;
• a wide spectrum of wallets are available, allow-
ing for both online and offline payments, espe-
cially hardware wallets embodied e.g. as smart-
cards;
• at least the payment scenarios C2B/B2C
(customer-to-business/business-to-customer) and
P2P (person-to-person) are supported;
1
Project Aurum (BIS Innovation Hub, 2022) distin-
guishes some further subtypes, but they are irrelevant for
this paper
How to Design a Public Key Infrastructure for a Central Bank Digital Currency
697