Research Article
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network
Table 1
Explanations on symbols in the FUIS.
| Notation | Meaning |
| | is chosen at random from a set | | The concatenation of two-bit strings and | | A secure hash function, for | | A finite field of the prime power order p | | An elliptic curve over | | The subgroup of the prime order in | | A finite field of integers modulo prime | | The identity of the entity E | | A secure chameleon hash function | | The current time used as a timestamp | | The expiration time of the ticket | | The AES algorithm to encrypt and decrypt the message m with the key | | The asymmetric encryption of the public key pk | | The signature on the message m of the private key sk | | A set of public keys for the ring signature, for E = {A3VI, ope} | | A ring signature with the RG and the signer’s secret key sk | | Verify the algorithm for the ring signature |
|
|