Research Article
CCMbAS: A Provably Secure CCM-Based Authentication Scheme for Mobile Internet
Table 3
The syntax and semantics of the BAN logical component.
| Symbol | Definition |
| | Subject believes . | | Subject receives the message . | | Subject has sent out the message . | | Subject has jurisdiction over . | | is fresh. | | is the shared key of subjects and , which is unknown to other subjects. | | is the public key of the subject . The other subjects do not know the corresponding private key . | | is the private key of the subject . | | is the shared secret between subjects and , which is unknown to other subjects. | | The ciphertext is obtained by encrypting with the key . | | A cascade between message and secret can prove that the message is sent by a certain subject. |
|
|