Research Article

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments

Table 2

The notations.

NotationsMeanings

Security parameter
An additive cyclic group
A multiplicative group
The prime order of and
The generator of
The master private key
The master public key
The secure hash functions
The users