Research Article
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
| Begin | (1) | Intercept the transmitted values | (2) | Call reveal oracle on for getting value of as) ←reveal1 | (3) | Call reveal oracle on for getting value of as← reveal1 | (4) | Calculate x' = | (5) | If (x'x), then | (6) | Extract the parameters from the mobile device. | (7) | Calculate | (8) | Call reveal oracle on input to discover {} as ( ← reveal1(. | (9) | Call reveal oracle on input to discover as ← reveal1 (. | (10) | Ten, compute MID' = h | (11) | If (MID′<i> </i>MID), then | | Accept ,, and as valid identity, password, and random number. | | Return (true) | (12) | Else | | Return (false) | (13) | End if | | End. |
|