Research Article
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Table 1
System parameters.
| | The identities of and , respectively | | Two large primes such that for some | | The master secret key of | | A (cryptographically strong) key shared between and | | A pair of symmetric encryption and decryption algorithms | | A cryptographic hash function |
|
|