Shared by 2 or more peers.
Confidentiality among the key holders.
Limited authentication of messages.
When block ciphers are used.
Performance (usually very efficient).
N interacting peers, pairwise secrecy -> N * (N-1)/2 keys.
Key distribution.
Last updated 2 years ago