Application of MFRFT to the Shamir's three-pass protocol

Yi Xin*, Ran Tao, Yue Wang

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

1 引用 (Scopus)

摘要

For extending Shamir's three-pass protocol to more fields, a novel implementation of the protocol was presented by MFRFT operator group and its commutative property. Secrecy can be obtained after three pass with no advance distribution of any key. The new implementation's security was studied, with which a novel protocol providing identity authentication is also presented to promote the practicability, and authorized users participate in the three pass with same concerted permutation matrices, which resists impostor sharing the secret. Simulations verify the validity of the proposed approache.

源语言英语
页(从-至)667-672
页数6
期刊Binggong Xuebao/Acta Armamentarii
29
6
出版状态已出版 - 6月 2008

指纹

探究 'Application of MFRFT to the Shamir's three-pass protocol' 的科研主题。它们共同构成独一无二的指纹。

引用此

Xin, Y., Tao, R., & Wang, Y. (2008). Application of MFRFT to the Shamir's three-pass protocol. Binggong Xuebao/Acta Armamentarii, 29(6), 667-672.