Common use of Registration Phase Clause in Contracts

Registration Phase. Let KGWN-U and PUGWN-U=gKGWN-U denote GWN’s private key and its corresponding public key, where s is kept secret by GWN and PUGWN-U is stored inside each user’s smart card. When a user, ▇▇ wants to be registered to the GWN, Ui proceeds with the following steps through a secure channel. Step 1: Ui selects a unique identity IDi and a password PWi, and generates a random number r. Then he (or she) computes RPWi=H(r||PWi) and submits the registration request {IDi, RPWi} to GWN. Step 2: Upon receiving the message, ▇▇▇ rejects the request if IDi is invalid. Otherwise, GWN computes TCi=H(KGWN-U||IDi) and PTCi=TCiRPWi, where KGWN-U is the long term secret key of GWN. Finally, GWN issues a smart card containing { H(·), g, PTCi, PUGWN-U } to Ui. Step 3: After receiving the smart card, Ui computes R=rIDiPWi and stores R into the card. The registration phase for sensor nodes is described as follows. Step 1: Sj submits it’s identifier SIDj to GWN through a secure channel. Step 2: Upon receiving the message, GWN computes TCj=H(KGWN-S||SIDj) and PUGWN-S=gKGWN-S, where KGWN-S is the GWN’s private key, PUGWN-S is another public key of the GWN for sensor nodes, and TCj is the temporal credential for Sj. Finally, GWN sends { TCj, g, PUGWN-S } to Sj. Step 3: After receiving the message, Sj stores { TCj, g, PUGWN-S } as its temporal credential.

Appears in 1 contract

Sources: Authenticated Key Agreement Scheme

Registration Phase. Let KGWN-U and PUGWN-U=gKGWN-U denote GWN’s private key and its corresponding public key, where s is kept secret by GWN and PUGWN-U is stored inside each user’s smart card. When a user, ▇▇ wants to be registered to the GWN, Ui proceeds with the following steps through a secure channel. Step 1: Ui selects a unique identity IDi and a password PWi, and generates a random number r. Then he (or she) computes RPWi=H(r||PWi) and submits the registration request {IDi, RPWi} to GWN. Step 2: Upon receiving the message, ▇▇▇ rejects the request if IDi is invalid. Otherwise, GWN computes TCi=H(KGWN-U||IDi) and PTCi=TCiRPWiTCi⊕RPWi, where KGWN-U is the long term secret key of GWN. Finally, GWN issues a smart card containing { H(·), g, PTCi, PUGWN-U } to Ui. Step 3: After receiving the smart card, Ui computes R=rIDiPWi r⊕IDi⊕PWi and stores R into the card. The registration phase for sensor nodes is described as follows. Step 1: Sj submits it’s identifier SIDj to GWN through a secure channel. . Step 2: Upon receiving the message, GWN computes TCj=H(KGWN-S||SIDj) and PUGWN-S=gKGWN-S, where KGWN-S is the GWN’s private key, PUGWN-S is another public key of the GWN for sensor nodes, and TCj is the temporal credential for Sj. Finally, GWN sends { TCj, g, PUGWN-S } to Sj. . Step 3: After receiving the message, Sj stores { TCj, g, PUGWN-S } as its temporal credential.

Appears in 1 contract

Sources: Authenticated Key Agreement Scheme