Research Article
A Secure Fair Exchange for SMS-Based Mobile Payment Protocols Based on Symmetric Encryption Algorithms with Formal Verification
Table 3
Cryptographic operation functions.
| Functions | Definition |
| | Encryption with delegation Key |
| | Encryption with symmetric key encryption |
| | Encryption with asymmetric key encryption |
| f1 | Cryptographic function to generate DK |
| f2 | Message Authentication Code function |
| f3 | Hash function |
|
|