Research Article
Provably Secure Client-Server Key Management Scheme in 5G Networks
Table 3
Symbols and descriptions.
| Symbol | Description |
| | User and IoT device | | Server | RC | Registration center | | Adversary | | Smart card | | The session key of | | The session key of | | The private key of the RC | | The private key of | | The biometrics of | | Fuzzy generator/reproduction function | | Hash function | | Map-to-point hash function | | Connect operation | | Exclusive or operation | | The -th communication of user | | The -th communication of server | | The -th communication of registry RC | | The number of times to make the query | | The number of times to make the query | | The m-th game | | The event that succeeds in the game | | The probability of the event |
|
|