Research Article

[Retracted] Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology

Table 1

Description of symbols in remote authentication protocol based on hash signature technology.

SymbolMeaning

(M)KSymmetric key K to encrypt M
[M]SKPrivate key K to perform asymmetric cryptographic operation on M
{M}PKAsymmetric cryptographic operation on m using public key K
||Connection operation
KSession key
PKAsymmetric cryptographic public key
SKAsymmetric password private key
APKPublic key for user trusted authentication (for hash-based signature)
ASKPrivate key for trusted authentication (for hash signature-based authentication)
X idIdentification of parameter x in trusted verification
ɑ, β, γThe protocol is used to protect the signature of message integrity
N iRandom number used in protocol session