Research Article

New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT

Algorithm 1

.
Begin
(1)Intercept the transmitted values
(2)Call reveal oracle on for getting value of as)reveal1
(3)Call reveal oracle on for getting value of asreveal1
(4)Calculate x'=
(5)If (x'x), then
(6)Extract the parameters from the mobile device.
(7)Calculate
(8)Call reveal oracle on input to discover {} as (reveal1(.
(9)Call reveal oracle on input to discover as reveal1 (.
(10)Ten, compute MID'=h
(11)If (MID′<i> </i>MID), then
Accept ,, and as valid identity, password, and random number.
Return (true)
(12)Else
Return (false)
(13)End if
End.