Research Article
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability
Table 2
Notations used through the paper.
| Notation | Description |
| | Security parameter | | Secret key of client | | Server | | Client | | Server’s data items | | Identity of client | | Pseudoidentity of client | | Subset of data items indices chosen by | | Bitwise Xor operation | | Size of the server’s big data | | i-th data item of big data | | Prime number | | Public key of client | | Secret signing key of party | | Public signing key of party | | Shared secret key | | Shared session key | | Distinctive hash functions | | i-th random number | | String concatenation operation | | Size of the subset | | Signature of i-th party |
|
|