Research Article
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
| | Notations | Meanings |
| | Security parameter | | An additive cyclic group | | A multiplicative group | | The prime order of and | | The generator of | | The master private key | | The master public key | | The secure hash functions | | The users |
|
|