Problems
keys must be distributed in secret
if key compromised, all is lost
# keys needed grows like Omega (n2)
Previous slide
Next slide
Back to first slide
View graphic version