Research Article

[Retracted] A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing

Table 1

Notations and description.

NotationsDescription

IDuUser identity
IDpsPublic cloud server identity
PSPublic cloud server
MSKupsMaster shared key b/w user and PS
SKpsSecret key of public cloud server
SKuSecret key of user
||, h(.)Concatenation, hash function
Gen()Generate
IDiIoT device identity
RSRegistration server
Fuzzy extractor
MSKipsMaster shared key b/w IoT and PS
SKiThe secret key to IoT device
S KSession key
, XOR operator, adversary
Rep()Reproduce