Research Article
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
| Symbol | Description |
| | user |
| S | Remote server |
| | Malicious adversary |
| | Identity of user |
| | Password of user |
| | Master key of S |
| P | A generator P of elliptic curve group |
| , | The current timestamp of , S |
| | The current timestamp |
| | Symmetric encryption/ decryption algorithm with key |
| SK | Session key between and S |
| | Hash function |
| | The string concatenation operation |
| | The bitwise XOR operation |
| → | A public communication channel |
| ⇒ | A secure communication channel |
| | Identity of home agent |
| | Identity of the foreign agent |
|
|