Research Article
On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys
Table 2
Establishing the secret keys
and
in our improved protocol.
| | |
| chooses a random , computes and , and sends to . At the same time, chooses a random , computes and , and sends to . Then, and set . | chooses a random , computes and , and sends to . At the same time, chooses a random , computes and , and sends to . Then, and set . |
|
|