Research Article

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network

Table 1

Explanations on symbols in the FUIS.

NotationMeaning

is chosen at random from a set
The concatenation of two-bit strings and
A secure hash function, for
A finite field of the prime power order p
An elliptic curve over
The subgroup of the prime order in
A finite field of integers modulo prime
The identity of the entity E
A secure chameleon hash function
The current time used as a timestamp
The expiration time of the ticket
The AES algorithm to encrypt and decrypt the message m with the key
The asymmetric encryption of the public key pk
The signature on the message m of the private key sk
A set of public keys for the ring signature, for E = {A3VI, ope}
A ring signature with the RG and the signer’s secret key sk
Verify the algorithm for the ring signature