For the protocol in Section 17.3, are there policy or legal risks with having the key server generate KAB? Are there things Alice and Bob would not say in a situation where the key server generates KAB that they would say if the key were known only to them?

For the protocol in Section 17.3, are there policy or legal risks with having the key server generate KAB? Are there things Alice and Bob would not say in a situation where the key server generates KAB that they would say if the key were known only to them?

© 2020 customphdthesis.com. All Rights Reserved. | Disclaimer: for assistance purposes only. These custom papers should be used with proper reference.