Skip to main content
Top

1983 | OriginalPaper | Chapter

Non-Public Key Distribution

Author : Rolf Blom

Published in: Advances in Cryptology

Publisher: Springer US

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Assume that it should be possible to protect messages transmitted in a N-user network by encryption. The encryption can either be performed by a public-key crypto system or by a conventional cipher. In the first case there is no need for key distribution. In the second case we have two choices, either to distribute keys from a key distribution center or use a public key distribution algorithm.

Metadata
Title
Non-Public Key Distribution
Author
Rolf Blom
Copyright Year
1983
Publisher
Springer US
DOI
https://doi.org/10.1007/978-1-4757-0602-4_22

Premium Partner