摘要
We would like to make some modifications on our protocol[1]in order to receive ideas in regards to the comments[2]made by Liu et al.about our paper.In the comment,they raised three weak points in regard to our protocols.First,they pointed out that either Bob or Charlie may,without their cooperation,gain some bit of shared information sent by Trent in our first and second protocols.Second,Alice’s secret information can be eavesdropped by Trent in the second protocol.Lastly,Trent can disturb communication because there is no message authentication in our second protocol.We suggest a few modifications in each protocol to make up for these weaknesses.
基金
Supported by the Ministry of Knowledge Economy of Korea under Grant No NIPA-2013-H0301-13-3007.