The document discusses the role of certification authorities in enabling e-commerce through establishing trust between parties. It explains that certification authorities issue digital certificates that map public keys to identities, allowing for the authentication of users and encryption of communications. The document outlines some of the main cryptographic techniques used, including secret key cryptography, public key cryptography for confidentiality and signatures for authenticity and integrity. It describes how public key infrastructure establishes a trusted system involving certification authorities that enable secure e-commerce transactions through protocols like SSL and SET.