Skip to main content
. 2017 Mar 21;17(3):644. doi: 10.3390/s17030644
Algorithm 1: Algorithm EXP1HASH,AAUAKAS.
 1. Eavesdrop login request message DIDi,MUi,G,Ci,T1 during the login phase.
 2. Call the Reveal oracle. Let (TIDi,HPWi,HIDi,T1)Reveal(MUi,G)
 3. Call the Reveal oracle. Let (IDi,u)Reveal(TIDi)
 4. Computes DIDi=h(IDi||u)HIDi
 5. if (DIDi=DIDi) then
 6.    Accepts IDi as the correct IDi of user Ui
 7.    Call the Reveal oracle. Let (PWi,Bioi)Reveal(HPWi)
 8.    Computes MUi,G=h(TIDi||h(PWi||Bioi)||HIDi||T1)
 9.    if (MUi,G=MUi,G) then
 10.       Accepts Bioi and PWi as the correct Bioi and PWi of user Ui
 11.       Call the Reveal oracle. Let (HIDi,K)Reveal(Ci)
 12.       if (HIDi=HIDi) then
 13.          Accept K as the correct secret key K of gateway node GWN
 14.          return 1 (Success)
 15.       else
 16.          return 0
 17.       end if
 18.    else
 19.       return 0
 20.    end if
 21. else
 22.    return 0
 23. end if