A method of establishing an encrypted communication by using keys between
a first electronic device associated with a first trusted authority and a
second electronic device, including generating a first secret key
associated with the first device for the management of the communication,
generating, at least in part by the first authority, a second secret key
associated with the second device for the management of the
communication. The method includes generating the first key at least in
part by a second trusted authority associated with the second device that
is distinct and autonomous from the first authority. Alternatively, the
generation of the first key is performed, at least in part, by the second
device passing through the second trusted authority.