Research Article
A Secure and Efficient ECC-Based Anonymous Authentication Protocol
Table 2
The notations and rules of BAN logic.
| | A principal |
| | A statement |
| | believes is true |
| | P see X, P receives a message that includes X |
| | P said X, P once sent a message containing X |
| | P has jurisdiction over X |
| | X is fresh |
| | P and Q have a shared key K |
| | X is combined with a secret K |
| Message meaning rule | |
| nonce-verification rule | |
| jurisdiction rule | |
|
|