Analyzing and computer security Chapter 11
Suppose four other parties, whom we might call E, F, G, and H, are all working on a common task, so they use one encryption key for all communication. Now, suppose H leaves the project and should no longer have access to encrypted communication. How can the other three ensure that H is now excluded?