Multiuser cryptographic techniques

@inproceedings{Diffie1976MultiuserCT,
  title={Multiuser cryptographic techniques},
  author={W. Diffie and M. Hellman},
  booktitle={AFIPS '76},
  year={1976}
}
  • W. Diffie, M. Hellman
  • Published in AFIPS '76 1976
  • Computer Science
  • This paper deals with new problems which arise in the application of cryptography to computer communication systems with large numbers of users. Foremost among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and requires subversion of several separate key distribution nodes to compromise the system's security. Its disadvantage is a high overhead for single message connections. The second technique is still in… CONTINUE READING
    238 Citations
    The Internet public key infrastructure
    • 39
    • PDF
    The History of Non-Secret Encryption
    • 29
    • PDF
    On the security of public key protocols
    • D. Dolev, A. Yao
    • Computer Science
    • 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
    • 1981
    • 4,219
    • PDF
    STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY’S SECURE WORLD
    Encryption and Secure Computer Networks
    • 112
    • PDF
    New directions in cryptography
    • 13,520
    • PDF
    Notes in Computer Science 4867