Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Protocols Secret Sharing is a method used to divide or break a secret message to 2 (two) or more recipients so that another beneficiary cannot know the results of fractional shares, except each recipient to exchange shares for reconstructing the secret. The problem that occurs is when the process transfer of shares, there are others who know the shares of the recipients and then that party is also able to reconstruct the secret, therefore the secret message required additional security, such as encryption of the message. The protocol used are the Three-Pass, this algorithm will guarantee the exchange of shares between the recipients. The three-pass protocol also provides convenience to the recipient to secure distribution share without having to do the encryption key, and the encrypted share is still safe. This study analyzes the security of secret delivery by combining the Secret Sharing Protocol and the Protocol Three-Pass.

Cite

CITATION STYLE

APA

Nababan, D., & Rahim, R. (2019). Security Analysis Combination Secret Sharing Protocol and Three-Pass Protocol. In Journal of Physics: Conference Series (Vol. 1175). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1175/1/012111

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free