| Algorithm 1: Algorithm . |
| 1. Eavesdrop login request message during the login phase. 2. Call the Reveal oracle. Let 3. Call the Reveal oracle. Let 4. Computes 5. if then 6. Accepts as the correct of user 7. Call the Reveal oracle. Let 8. Computes 9. if then 10. Accepts and as the correct and of user 11. Call the Reveal oracle. Let 12. if then 13. Accept as the correct secret key K of gateway node 14. return 1 (Success) 15. else 16. return 0 17. end if 18. else 19. return 0 20. end if 21. else 22. return 0 23. end if |