Research Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Table 6
The assumptions in BAN-logic.
| Assumption |
| A1: UX | ≡ (UX Sj) − UX believes UX can share UIDX with Sj | A2: UX | ≡ (UX Sj) − UX believes UX can share with Sj | A3: UX | ≡ (Sj ⇒ (UX Sj)) − UX believes Sj controls the sharing of the session key between UX and Sj | A4: Sj | ≡ (UX ⇒ (UX Sj)) − Sj believes UX controls the sharing of UIDX between UX and Sj | A5: Sj | ≡ (UX ⇒ (UX Sj)) − Sj believes UX controls the sharing of the session key between UX and Sj | A6: Sj | ≡ (Sj UX) − Sj believes Sj can share with UX | A7: UX | ≡ # (rS ⊗ ) − UX believes challenge messages from Sj are fresh | A8: Sj | ≡ # (rU ⊗ ) − Sj believes challenge messages from UX are fresh |
|
|