Public key infrastructure, Public key certificate
How to trust the Public Key like the MitM attack against Diffie-Hellman. The public key used in signature verification in digital signatures must be the real sender's public key. The solution is to use signatures of CAs for key distribution. This is why a certificate, which considers the public key as a message and gets.
PKI Notion
PKI Usages