Prof Bill Buchanan OBE

Oct 24, 2020

3 min read
Photo by Chris Montgomery on Unsplash

Conference keying — the Burmester-Desmedt method

With conference keying, we have t participants, and each of these generates a secret value (r_i), and then transmit a public value generated from this (Z_i). Each of the participants then uses these values, and their secret value, and will generate the same secret key (K_i). In the following, we will use the Burmester-Desmedt method [1], and have five participants, and with varying sizes of a shared prime…