Research Article

A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification

Table 3

Cryptographic operation functions.

FunctionsDefinition

Encryption with delegation Key

Encryption with symmetric key encryption

Encryption with asymmetric key encryption

f1Cryptographic function to generate DK

f2Message Authentication Code function

f3Hash function