Research Article

Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

Table 1

System parameters.

The identities of and , respectively
Two large primes such that for some
The master secret key of
A (cryptographically strong) key shared between and
A pair of symmetric encryption and decryption algorithms
A cryptographic hash function