Title :
The Master Key Problem
Author :
Denning, Dorothy E. ; Schneider, Fred B.
Author_Institution :
Purdue University
Abstract :
Four methods for generating and distributing shared group encryption keys in a cryptographic system are described. All four methods can be used to implement secure broadcasts among groups of users in computer networks. Two methods use n secret keys to construct a master key for 2n -1 keys.
Keywords :
Authentication; Educational institutions; Polynomials; Protocols; Public key; Registers;
Conference_Titel :
Security and Privacy, 1980 IEEE Symposium on
Conference_Location :
Oakland, CA, USA
Print_ISBN :
0-8186-0335-6
DOI :
10.1109/SP.1980.10009