Application of MFRFT to the Shamir's three-pass protocol

Yi Xin*, Ran Tao, Yue Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

For extending Shamir's three-pass protocol to more fields, a novel implementation of the protocol was presented by MFRFT operator group and its commutative property. Secrecy can be obtained after three pass with no advance distribution of any key. The new implementation's security was studied, with which a novel protocol providing identity authentication is also presented to promote the practicability, and authorized users participate in the three pass with same concerted permutation matrices, which resists impostor sharing the secret. Simulations verify the validity of the proposed approache.

Original languageEnglish
Pages (from-to)667-672
Number of pages6
JournalBinggong Xuebao/Acta Armamentarii
Volume29
Issue number6
Publication statusPublished - Jun 2008

Keywords

  • Image encryption
  • Information process
  • Information processing
  • Multifractional fourier transform (MFRFT)
  • Shamir's three-pass protocol

Fingerprint

Dive into the research topics of 'Application of MFRFT to the Shamir's three-pass protocol'. Together they form a unique fingerprint.

Cite this