Research Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Algorithm 1
(
M,
N,
sk ⟵
Hash (
OHash,
K)).
| Set LU ⟵ {U1, …, Un}, LS ⟵ {S1, …, Sn} | | Run (LU, LS, sk) | | if A chooses qE pairs to execute then | | B does & returns all sid to A | | end if | | if A asks qR queries to fresh Oi in LU and LSthen | | if Oi is normal in LU and LSthen | | B lets Oi return session-key to A as usual | | else | | B returns random string to A | | end if | | end if | | if A asks qS queries to Oi in LU and LSthen | | if Oi is normal in LU and LSthen | | B lets Oi & A exchange mout as usual | | else | | B simulates & gives to A mout including M and N | | end if | | end if | | if A asks qC queries to some in LUthen | | B returns smart-card or {UID, B} of to A | | else | | B returns random smart-card or {UID′, B′} to A | | end if | | if A asks qH queries to OHashthen | | B lets OHash do with A | | end if | | Until A stops and outputs {b′, Z} | | B returns (Hash (OHash, Z) = sk) |
|