Next: SKIP and Photuris
Up: Key Distribution
Previous: Certification Hierarchies
Basic problem with using cryptographic techniques is that each
person to whom a key must be distributed has to be authenticated.
This is not a great way to scale. Alternative solutions which are
based on shared secrets are not as secure.