Authentication Phase. We can think of the authentica- tion phase of Li et al.’s scheme as a two-pass protocol. The individual steps are outlined below: Step 1: N IN : tidN , yN , aN , bN , tN . N picks a random rN and creates timestamp tN . Then it computes xN = aN ⊕idN , yN = xN ⊕rN and tidN = h(idN ⊕tN , rN ) and forwards the tuple ⟨tidN , yN , aN , bN , tN ⟩ to IN .
Appears in 1 contract
Sources: Key Agreement Protocol
Authentication Phase. We can think of the authentica- tion phase of Li et al.’s scheme as a two-pass protocol. The individual steps are outlined below: below:
Step 1: 1 N IN : tidN , yN , aN , bN , tN . N picks a random rN and creates timestamp tN . Then it computes xN = aN ⊕idN ⊕ idN , yN = xN ⊕rN ⊕ rN and tidN = h(idN ⊕tN ⊕ tN , rN ) and forwards the tuple ⟨tidN (tidN , yN , aN , bN , tN ⟩ ) to IN .
Appears in 1 contract
Sources: Key Agreement Protocol