A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
Table 5
Simulation of query.
(1) On a query which denotes the start of protocol, assuming runs correctly, then first step operation of the authentication process; then, the query is answered with
(2) On a query , assuming runs correctly, then performs the second step operation of the authentication process; then, the query is answered with
(3) On a query , assuming runs correctly, then performs the third step operation of the authentication process; then, the query is answered with
(4) On a query , assuming runs correctly, then performs the fourth step operation of the authentication process; then, the query is answered with
(5) On a query , assuming runs correctly, then executes the fifth step operation of the authentication process; then, the query is answered with