Research Article

A Secure and Efficient ECC-Based Anonymous Authentication Protocol

Table 1

Notations.

SymbolDescription

user

SRemote server

Malicious adversary

Identity of user

Password of user

Master key of S

PA generator P of elliptic curve group

, The current timestamp of , S

The current timestamp

Symmetric encryption/ decryption algorithm with key

SKSession key between and S

Hash function

The string concatenation operation

The bitwise XOR operation

A public communication channel

A secure communication channel

Identity of home agent

Identity of the foreign agent