Multiuser cryptographic techniques

@inproceedings{Diffie1976MultiuserCT,
  title={Multiuser cryptographic techniques},
  author={W. Diffie and M. Hellman},
  booktitle={AFIPS '76},
  year={1976}
}
This paper deals with new problems which arise in the application of cryptography to computer communication systems with large numbers of users. Foremost among these is the key distribution problem. We suggest two techniques for dealing with this problem. The first employs current technology and requires subversion of several separate key distribution nodes to compromise the system's security. Its disadvantage is a high overhead for single message connections. The second technique is still in… Expand
The Internet public key infrastructure
The History of Non-Secret Encryption
On the security of public key protocols
  • D. Dolev, A. Yao
  • Computer Science
  • 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981)
  • 1981
STUDY OF CRYPTOLOGY AND ITS FORMS IN TODAY’S SECURE WORLD
Encryption and Secure Computer Networks
New directions in cryptography
Notes in Computer Science 4867
...
1
2
3
4
5
...