Research Article
Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
| Input:, , , threshold value , the weight of and and the weight of . | | Output: if the algorithm succeeds, otherwise. | (1) | , , | (2) | while [ or ] and do | (3) | sum | (4) | temp | (5) | fordo | (6) | if sum then | (7) | temp [i] = temp 1 | (8) | end if | (9) | end for | (10) | temp | (11) | | (12) | end while | (13) | ifthen | (14) | Outputs | (15) | else | (16) | Outputs | (17) | end if |
|