The Protocol
The key exchange protocol involves a trusted party (Trent) and a group of users. Let Alice and Bob be two users of the group.
Read more about this topic: Blom's Scheme
The Protocol
The key exchange protocol involves a trusted party (Trent) and a group of users. Let Alice and Bob be two users of the group.
Read more about this topic: Blom's Scheme