Research Article

Efficient Hierarchical Authentication Protocol for Multiserver Architecture

Table 2

Notations used in the proposed protocol.

NotationDescription

The registration center
The user
The service provider
The adversary
The identity of user
The identity of service provider
The password of a user
The user’s personal biometrics
The biometric key
eThe private key expire parameter
Random numbers from
The session key
Concatenation operation
The authentication right tree
The authentication right tree on service provider side
The authentication right parameters
The node of the authentication right tree
The subnode of
The fuzzy-extractor generation procedure
The deterministic reproduction procedure
Secure one-way hash functions
ID revocation list