Research Article

Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre

Table 2

The notations and rules of BAN logic.

SymbolsDescription

, A principal
A statement
is fresh
gets
is sent by
believes
and have a common secret
is encrypted under
is the public key of
has jurisdiction over
is merged with
Message meaning rule (rule 1) or
Nonce-verification rule (rule 2)
Jurisdiction rule (rule 3)