N-key systems
Multi-person signature schemes
- To make the bomb go boom, it takes multiple keys
Multi-person decryption schemes
- To read the secret message takes multiple keys
Multi-person encryption schemes
- To make a valid message takes multiple keys
More keys than values leads to ‘m of n’ system
Example: solving n equations in n unknowns