Skip to main content
. 2016 Jun 8;16(6):837. doi: 10.3390/s16060837
Algorithm 2 EXP2AHash.
  •   1:

    Eavesdrop the authenticated message {Gi,Fi}, where Gi=h(TIDi,IDSNj,h(IDSNjSran),IDGWN,T2,rk,ri), Fi=Eh(IDSNjSran)(rkri,TIDi,T1,T2)

  •   2:

    Call Reveal2 oracle. Let (TIDi,IDSNj,h(IDSNj

  •   3:

    Eavesdrop the communicated message {Ii,Hi}, Ii=h(IDSNj,TIDi,T3,SK), Hi=Ench(IDSNjSran)(rj,T3,rk,ri)

  •   4:

    Call Reveal2 oracle. Let (IDSNj,TIDi,T3,SK)Reveal2(Di)

  •   5:

    If (TIDi=TIDi) then

  •   6:

    Accept SK as the session key among Ui, GWN and SNj

  •   7:

    return 1

  •   8:

    else

  •   9:

    return 0

  • 10:

    end if