One skilled in the art will readily recognize that the present invention is equally applicable to other contexts in which confidential information is securely communicated among three or more parties, and even those using communication media other than the Internet.