Research Article
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
Table 1
The assumptions in BAN-logic.
| | Assumptions |
| | A1: U ∣≡(US) – U believes U can share ID with S | | A2: U ∣≡(US) – U believes U can share K with S | | A3: U ∣≡(S⇒(US)) – U believes S controls the sharing of sk between U and S | | A4: S ∣≡(U⇒(US)) – S believes U controlsthe sharing of ID between U and S | | A5: S ∣≡(U⇒(US)) –S believes U controls the sharing of sk between U and S | | A6: S ∣≡(SU) – S believes S can share K with U | | A7: U ∣≡ #(r⊗ K) – U believes the challenge messages from S is fresh | | A8: S ∣≡ #(r⊗ K) – S believes the challenge messages from U is fresh |
|
|