Abstract
For extending Shamir's three-pass protocol to more fields, a novel implementation of the protocol was presented by MFRFT operator group and its commutative property. Secrecy can be obtained after three pass with no advance distribution of any key. The new implementation's security was studied, with which a novel protocol providing identity authentication is also presented to promote the practicability, and authorized users participate in the three pass with same concerted permutation matrices, which resists impostor sharing the secret. Simulations verify the validity of the proposed approache.
Original language | English |
---|---|
Pages (from-to) | 667-672 |
Number of pages | 6 |
Journal | Binggong Xuebao/Acta Armamentarii |
Volume | 29 |
Issue number | 6 |
Publication status | Published - Jun 2008 |
Keywords
- Image encryption
- Information process
- Information processing
- Multifractional fourier transform (MFRFT)
- Shamir's three-pass protocol