Research Article

Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment

Table 6

The assumptions in BAN-logic.

Assumption

A1: UX | ≡ (UXSj) − UX believes UX can share UIDX with Sj
A2: UX | ≡ (UXSj) − UX believes UX can share with Sj
A3: UX | ≡ (Sj ⇒ (UXSj)) − UX believes Sj controls the sharing of the session key between UX and Sj
A4: Sj | ≡ (UX ⇒ (UXSj)) − Sj believes UX controls the sharing of UIDX between UX and Sj
A5: Sj | ≡ (UX ⇒ (UXSj)) − Sj believes UX controls the sharing of the session key between UX and Sj
A6: Sj | ≡ (SjUX) − Sj believes Sj can share with UX
A7: UX | ≡ # (rS ⊗ ) − UX believes challenge messages from Sj are fresh
A8: Sj | ≡ # (rU ⊗ ) − Sj believes challenge messages from UX are fresh