Research Article

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability

Table 2

Notations used through the paper.

NotationDescription

Security parameter
Secret key of client
Server
Client
Server’s data items
Identity of client
Pseudoidentity of client
Subset of data items indices chosen by
Bitwise Xor operation
Size of the server’s big data
i-th data item of big data
Prime number
Public key of client
Secret signing key of party
Public signing key of party
Shared secret key
Shared session key
Distinctive hash functions
i-th random number
String concatenation operation
Size of the subset
Signature of i-th party