Blom's Scheme - The Protocol

The Protocol

The key exchange protocol involves a trusted party (Trent) and a group of users. Let Alice and Bob be two users of the group.

Read more about this topic:  Blom's Scheme