摘要 |
The method involves using a central station (C) which generates a secret key and a public key and passes them to users (A). The user generates a further secret key and public key. The public key is encrypted using the centre public key, and the two keys sent to the central station. In response to the arrival of the user keys, the central station decrypts the user public key. If the key is correct, the central station retransmits the public key which is encrypted with itself. |