Research Article
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
| | Begin | | (1) | Intercept the transmitted values | | (2) | Call reveal oracle on for getting value of as) ←reveal1 | | (3) | Call reveal oracle on for getting value of as← reveal1 | | (4) | Calculate x' = | | (5) | If (x'x), then | | (6) | Extract the parameters from the mobile device. | | (7) | Calculate | | (8) | Call reveal oracle on input to discover {} as ( ← reveal1(. | | (9) | Call reveal oracle on input to discover as ← reveal1 (. | | (10) | Ten, compute MID' = h | | (11) | If (MID′<i> </i>MID), then | | | Accept ,, and as valid identity, password, and random number. | | | Return (true) | | (12) | Else | | | Return (false) | | (13) | End if | | | End. |
|