Abstract
This paper proposed the key exchange protocol based on Thompson's group, which controls the process of generating words, and designed experiments to show that the protocol can resist the length-based attack. Moreover, because the length-based attacks on other non-commutative groups are similar to the one on Thompson's group, it suggests that the approaches can be applied to any other non-commutative group to resist the length-based attack on that group.
| Original language | English |
|---|---|
| Pages (from-to) | 968-974 |
| Number of pages | 7 |
| Journal | Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University |
| Volume | 44 |
| Issue number | 7 |
| State | Published - Jul 2010 |
| Externally published | Yes |
Keywords
- Key exchange protocol
- Length-based attack
- Thompson's group