Common use of Authentication Phase Clause in Contracts

Authentication Phase. We can think of the authentica- tion phase of Li et al.’s scheme as a two-pass protocol. The individual steps are outlined below:‌ Step 1: N IN : tidN , yN , aN , bN , tN . N picks a random rN and creates timestamp tN . Then it computes xN = aN ⊕idN , yN = xN ⊕rN and tidN = h(idN ⊕tN , rN ) and forwards the tuple ⟨tidN , yN , aN , bN , tN ⟩ to IN .

Appears in 1 contract

Sources: Key Agreement Protocol

Authentication Phase. We can think of the authentica- tion phase of Li et al.’s scheme as a two-pass protocol. The individual steps are outlined below:‌ below:‌ Step 1: 1 N IN : tidN , yN , aN , bN , tN . N picks a random rN and creates timestamp tN . Then it computes xN = aN ⊕idN ⊕ idN , yN = xN ⊕rN ⊕ rN and tidN = h(idN ⊕tN ⊕ tN , rN ) and forwards the tuple ⟨tidN (tidN , yN , aN , bN , tN ) to IN .

Appears in 1 contract

Sources: Key Agreement Protocol