Research Article
[Retracted] Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology
Table 1
Description of symbols in remote authentication protocol based on hash signature technology.
| Symbol | Meaning |
| (M)K | Symmetric key K to encrypt M | [M]SK | Private key K to perform asymmetric cryptographic operation on M | {M}PK | Asymmetric cryptographic operation on m using public key K | || | Connection operation | K | Session key | PK | Asymmetric cryptographic public key | SK | Asymmetric password private key | APK | Public key for user trusted authentication (for hash-based signature) | ASK | Private key for trusted authentication (for hash signature-based authentication) | X id | Identification of parameter x in trusted verification | ɑ, β, γ | The protocol is used to protect the signature of message integrity | N i | Random number used in protocol session |
|
|