Multiuser cryptographic techniques

@inproceedings{Diffie1976MultiuserCT,
  title={Multiuser cryptographic techniques},
  author={W. Diffie and M. Hellman},
  booktitle={AFIPS '76},
  year={1976}
}
  • W. Diffie, M. Hellman
  • Published in AFIPS '76 1976
  • Computer Science
  • This paper deals with new problems which arise in the application of cryptography to computer communication systems with large numbers of users. Foremost among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and requires subversion of several separate key distribution nodes to compromise the system's security. Its disadvantage is a high overhead for single message connections. The second technique is still in… CONTINUE READING
    New directions in cryptography
    • 13,267
    • PDF
    On the security of public key protocols
    • 4,152
    • PDF
    The Internet public key infrastructure
    • 39
    • PDF
    Encryption and Secure Computer Networks
    • 112
    • PDF
    The History of Non-Secret Encryption
    • 29
    • PDF
    The first ten years of public-key cryptography
    • 222