Research Article

Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment

Table 1

The assumptions in BAN-logic.

Assumptions

A1: U ∣≡(US) – U believes U can share ID with S
A2: U ∣≡(US) – U believes U can share K with S
A3: U ∣≡(S⇒(US)) – U believes S controls the sharing of sk between U and S
A4: S ∣≡(U⇒(US)) – S believes U controlsthe sharing of ID between U and S
A5: S ∣≡(U⇒(US)) –S believes U controls the sharing of sk between U and S
A6: S ∣≡(SU) – S believes S can share K with U
A7: U ∣≡ #(rK) – U believes the challenge messages from S is fresh
A8: S ∣≡ #(rK) – S believes the challenge messages from U is fresh