Registration Phase. User registers with GWN. A new user Ui proceeds with the following steps through a secure channel. Step 1: Ui selects a unique identity IDi and a password PWi, and generates a random value r. Then he (or she) computes RPWi=H(r||PWi) and submits the registration request message R=(IDi, RPWi) to GWN. Step 2: Upon receiving R, GWN verifies the validity of IDi and rejects the registration request if IDi is invalid. Then GWN continues to compute TCi=H(KGWN-U||IDi||TEi) and PTCi=TCi⊕RPWi. GWN initializes the temporary identity TIDi and stores (TIDi, IDi, TEi) in the verification table. Finally, GWN issues the smart card containing { H(·), ▇▇▇▇, TEi, PTCi } to Ui. Step 3: After receiving the smart card, Ui stores r into the card. The registration phase for SNs is described as follows. Step 1: Sj submits it’s identifier SIDj to GWN through a secure channel. Step 2: Upon receiving the message, GWN computes TCj=H(KGWN-S||SIDj), where KGWN-S is the GWN’s private key and TCj is the temporal credential for Sj. Finally, GWN sends TCj to Sj. Step 3: After receiving the message, Sj stores TCj as its temporal credential.
Appears in 1 contract
Sources: Authenticated Key Agreement Scheme
Registration Phase. User registers with GWN. A new user Ui proceeds with the following steps through a secure channel.
Step 1: Ui selects a unique identity IDi and a password PWi, and generates a random value r. Then he (or she) computes RPWi=H(r||PWi) and submits the registration request message R=(IDi, RPWi) to GWN.
Step 2: Upon receiving R, GWN verifies the validity of IDi and rejects the registration request if IDi is invalid. Then GWN continues to compute TCi=H(KGWN-U||IDi||TEi) and PTCi=TCi⊕RPWiTCiRPWi. GWN initializes the temporary identity TIDi and stores (TIDi, IDi, TEi) in the verification table. Finally, GWN issues the smart card containing { H(·), ▇▇▇▇, TEi, PTCi } to Ui.
Step 3: After receiving the smart card, Ui stores r into the card. The registration phase for SNs is described as follows.
Step 1: Sj submits it’s identifier SIDj to GWN through a secure channel.
. Step 2: Upon receiving the message, GWN computes TCj=H(KGWN-S||SIDj), where KGWN-S is the GWN’s private key and TCj is the temporal credential for Sj. Finally, GWN sends TCj to Sj. Step 3: After receiving the message, Sj stores TCj as its temporal credential.
Appears in 1 contract
Sources: Authenticated Key Agreement Scheme