Research Article
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
Table 2
The notations and rules of BAN logic.
| | A principal | | A statement | K | A key | | P sees X, P receives a message containing X | | P said X, P sent a message including X | | believes is true | | P and Q share a secret | | X is fresh | | P and Q share a key K | | is encrypted under the key K | | X is combined with a secret Y | | P has jurisdiction over | Message meaning rule | or | Belief rule | | Nonce-verification rule | | Jurisdiction rule | ā |
|
|