Research Article

A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity

Table 5

Simulation of query.

(1) On a query which denotes the start of protocol, assuming runs correctly, then first step operation of the authentication process; then, the query is answered with
(2) On a query , assuming runs correctly, then performs the second step operation of the authentication process; then, the query is answered with
(3) On a query , assuming runs correctly, then performs the third step operation of the authentication process; then, the query is answered with
(4) On a query , assuming runs correctly, then performs the fourth step operation of the authentication process; then, the query is answered with
(5) On a query , assuming runs correctly, then executes the fifth step operation of the authentication process; then, the query is answered with