Research Article
A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification
Table 14
Notations of BAN logic [
27].
| Notation | Definitions |
| X, Y | Statement |
| P, Q | Parties |
| P|≡X | P believes in X |
| P⊲X | P sees X |
| P|~X | P once said X |
| P|⇒X | P has the jurisdiction over X |
| #(X) | The formula X is fresh |
| P Q | P and Q may use the shared key K to communicate |
| P Q | The formula Y is a secret known only to P and Q |
| | The formula X is encrypted under the key K |
| (X)K | The hash value of X using K as key |
|
|