I've never developed an encryption scheme, before, so I don't know how it works. I just know that it works because people use shared keys, split keys, and distributed keys, in other systems.

Reply to this note

Please Login to reply.

Discussion

No replies yet.