Skip to main content
. 2017 Dec 15;17(12):2919. doi: 10.3390/s17122919
q A k-bit prime
Fq A prime finite field
E/Fq An elliptic curve E over Fq
G A cyclic additive group of composite order q
P A generator for the group G
s A secret key of the system
PK A public key of the system, PK=sP
f(x,y) A polynomial function that f(x,y) equal to f(y,x)
Hi() ith one-way hash function
h() A one-way hash function
ri,a,b x’s identity, like a universally unique identifier (UUID) code
IDx A random number of the elliptic curve group
Sx x’s elliptic curve group signature
TID A transaction number which changes every round
Ki A polynomial function or elliptic curve-related information
PEK A session key established by personal reader and medical reader
Ex(m) Use a session key x to encrypt the message m
Dx(m) Use a session key x to decrypt the message m
CHKx x’s verified message
A=?B Determines if A is equal to B
data Body sensor’s related sensing information
ci The session key and transaction number encrypted sensing data