Security and Communication Networks / 2017 / Article / Alg 1

Research Article

Improving an Anonymous and Provably Secure Authentication Protocol for a Mobile User

Algorithm 1

Algorithm .
(1) Eavesdrop the login request message
(2) Call the Reveal oracle. Let
(3) Eavesdrop the authentication response message
(4) Use the Reveal oracle. Let
(5) if    then
(6)   Compute
(7)   Call the Reveal oracle. Let
(8)   if   ()  then
(9)     Compute
(10)     Call the Reveal oracle. Let
(11)     Call the Reveal oracle. Let
(12)     if  ()  then
(13)       Accept , , , as the correct , , , , respectively.
(14)       return  0 (Success)
(15)     else
(16)       return  0 (Failure)
(17)   else
(18)     return  0 (Failure)
(19) else
(20)   return  0 (Failure)
(21) end if

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.