“…In classical cryptography, three-party key distribution protocols (Wen et al, 2005;Nam et al, 2004) utilize challenge response mechanisms (Stallings, 1998) or timestamps (Shirey, 2000) to prevent replay attacks (Bennett and Brassard, 1984), However, challenge response mechanisms require at least two communication rounds (Gottesman and Lo, 2003) between the TC and participants and the timestamp approach needs the assumption of clock synchronization which is not practical in distributed systems (due to the unpredictable nature of network delays and potential hostile attacks) (Bennett, 1992). Furthermore, classical cryptography cannot detect the existence of passive attacks (Hwang et al, 2007) such as eavesdropping.…”