Tony, For an early look at the topic you might read "Security Requirements and Protocols for a Broadcast Scenario," S.T. Kent, IEEE Transactions on Communications 29(6), June 1981, pp 778-786. Despite the title, it does address multicast key distribution for symmetric and asymmetric cryptography. Steve