Research Article
Efficient Hierarchical Authentication Protocol for Multiserver Architecture
Table 2
Notations used in the proposed protocol.
| Notation | Description |
| | The registration center | | The user | | The service provider | | The adversary | | The identity of user | | The identity of service provider | | The password of a user | | The user’s personal biometrics | | The biometric key | e | The private key expire parameter | | Random numbers from | | The session key | | Concatenation operation | | The authentication right tree | | The authentication right tree on service provider side | | The authentication right parameters | | The node of the authentication right tree | | The subnode of | | The fuzzy-extractor generation procedure | | The deterministic reproduction procedure | | Secure one-way hash functions | | ID revocation list |
|
|