Non-Public Key Distribution

  • Rolf Blom


Assume that it should be possible to protect messages transmitted in a N-user network by encryption. The encryption can either be performed by a public-key crypto system or by a conventional cipher. In the first case there is no need for key distribution. In the second case we have two choices, either to distribute keys from a key distribution center or use a public key distribution algorithm.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    F. J. MacWilliams and N. J. A. Sloane, chapter 11 in: “The Theory of Error Correcting Codes”, North Holland, Amsterdam (Third Printing 1981 ).Google Scholar

Copyright information

© Springer Science+Business Media New York 1983

Authors and Affiliations

  • Rolf Blom
    • 1
  1. 1.Dept. of Electrical EngineeringLinköping UniversityLinköpingSweden

Personalised recommendations