Skip to Main Content
Key transport protocols are useful to convey the secrete key or session key from one party to another party. These protocols play an important role in key distribution systems if they do not require any priori key sharing. Shamir's No-key protocol is the best example of it; but it does not provide an authentication. In this paper we propose an authenticated key transport protocol based on Shamir's No-key protocol, which provides an authentication as well as key conformation. Proposed protocol can be used to distribute the shares in secrete sharing schemes or to distribute secrete keys to the user.