Non-Public Key Distribution
Assume that it should be possible to protect messages transmitted in a N-user network by encryption. The encryption can either be performed by a public-key crypto system or by a conventional cipher. In the first case there is no need for key distribution. In the second case we have two choices, either to distribute keys from a key distribution center or use a public key distribution algorithm.
Unable to display preview. Download preview PDF.
- 1.F. J. MacWilliams and N. J. A. Sloane, chapter 11 in: “The Theory of Error Correcting Codes”, North Holland, Amsterdam (Third Printing 1981 ).Google Scholar