Skip to main content
. 2016 Jun 8;16(6):837. doi: 10.3390/s16060837
Algorithm 1 EXP1AΩ.
  •   1:

    Eavesdrop the login message {Di,Ei}, Di=Ench(TIDi,Xk)(IDi,T1,TIDi,ri), Ei=h(h(IDi,Xk),ri,T1)

  •   2:

    Call Reveal1 oracle. Let (IDi,T1,TIDi,ri)Reveal1(Di)

  •   3:

    Intercept the authenticated message {Fi,Gi}, where Fi=Eh(IDSNjSran)(rkri,TIDi,T1,T2), Gi=h(TIDi,IDSNj,h(IDSNjSran),IDGWN,T2,rk,ri).

  •   4:

    Call Reveal1 oracle. Let (rk*,ri*,TIDi*,T1*,T2*)Reveal(Fi)

  •   5:

    If (T1=T1*) then

  •   6:

    Accept IDi as the true identity of the user Ui

  •   7:

    return 1

  •   8:

    else

  •   9:

    return 0

  • 10:

    end if