Algorithm 1
. |
-
1:
Eavesdrop the login message , ,
-
2:
Call Reveal1 oracle. Let
-
3:
Intercept the authenticated message , where , .
-
4:
Call Reveal1 oracle. Let
-
5:
If () then
-
6:
Accept as the true identity of the user
-
7:
return 1
-
8:
else
-
9:
return 0
-
10:
end if
|