Regardless of where encryption takes place, key management … there is usually little need to distribute keys … Authentication … is a less serious issue … [File system] keys can be said to be distributed … have much longer lifetimes than their communication counterparts. …
Google-1
Google-2
Copyright clearance needed for quotation.