- all the parties in communication has to agree on storing encrypted text and need keys from all the parties to decrypt the messages