Authenticated Key Agreement Phase Sample Clauses

Authenticated Key Agreement Phase. This phase is to establish a secure session key between two mobile devices, UA and UB, by helping of AuC after the authentication. AuC needs to be involved in this phase because UA and UB could not believe each other due to no credibility between them. The phase shown in Fig. 3 is performed as follows • [AP 1] UA→UB UA inputs XXX and PWA, generates a random number a and computes YA as in (4), RA as in (5), CIDA as in (6) and MACA as in (7). After that, UA sends {RA, CIDA, MACA} to UB. YÆ = Va⊕h(PWÆ||rÆ) (4) RÆ = ga (5) CIDÆ = IDÆ⊕(PUÆuC )a (6) MACÆ = h(YÆ||RÆ||IDÆ) (7) • [AP 2] UB→AuC UB inputs IDB and PWB, generates a random number b and computes YB as in (8), RB as in (9), CIDB as in (10) and MACB as in (11). After that, UB sends {RB, CIDB, MACB, RA, CIDA, MACA } to AuC. YB = VB ⊕h(PWB||rB) (8) RB = gb (9) CIDB = IDB⊕(PUÆuC )b (10)
AutoNDA by SimpleDocs
Authenticated Key Agreement Phase. Step 1: After TS receives the message <XA, YA, PA>, it computes XXX’ = YA⨁ ê(d, XA) and decrypts PA using KA-TS. Then, TS computes MA’=h(VA||XXX’||IDB) and checks whether h(VA||XXX’||IDB) equals to MA. If not, TS stops the request. Otherwise, TS chooses a random number RTS and computesZTS = h(IDTS||IDB||RTS), IDB-T= ZTS ⨁ h(IDB||XXX) andCTS = EKB-TS(XXX||ZTS||IDB-T). Then, TS sends the message <XA, CTS > to B.
Authenticated Key Agreement Phase. After the successful login with TS, all three participants communicate for the secure key agreement with privacy preserved. Figure 4 shows the steps of it and the detailed processes are as follows.  Step 1: After TS receives the message <XA, YA, CA-TS>, it computes XXX’ = YAXOR ê(d, XA) and decrypts CA- TS using KA-TS to withdraw MA and IDB. Then, TS computes VA’ = H(IDTS||XXX||d) and MA’=H(VA’||XXX’||IDB) and checks whether MA’ equals to MA. If not, TS stops the request. Otherwise, TS chooses a random number RTS and computes NTS = H(IDTS||IDB||RTS), G= NTSXOR H(XXX||IDB) and CTS- B= KB-TS(XXX||NTS||G). Then, TS sends the message <XA, CTS-B> to B.  Step 2: Upon receiving<XA, CTS-B> from TS, B decrypts CTS-Busing KB-TS to withdraw XXX, NTS and G. After that, B computes G’ = NTSXOR H(IDB||XXX) and checks if G’ equals to G. If not, this session is aborted.  Step 3: Otherwise, B chooses a random number RB and computes XB = ê(RB, P), ZB = ê(RB, XA), VB’ = V3 XOR WB’, SKB=H(ZB||XXX||IDB), S=H(SKB||XXX||IDB),MB = H(VB’||XXX||IDB||KB-TS), and request. Otherwise, TS computes CTS-A= KA-TS(S ||XXX||IDB), and sends the message < CTS-A, XB > to A.  Step 5: Upon receiving < CTS-A, XB > from TS, A decrypts CTS-A using KA-TS to withdraw S, XXX and IDB. After that, A computes ZA = ê(RA, XB), SKA = H(ZA||XXX||IDB) and S’=H(SKA||XXX||IDB) and checks if S’ equals to S. If not, the session is terminated. After the successful authenticated key agreement phase, the agreed session key (SKA=SKB) could be used to provide confidentiality on the prescription. It means that B could send an encrypted prescription message based on the symmetric key cryptosystem using SKB to A via TS. Then, A could decrypt the message using SKA and perform necessary processes for health treatment.
Authenticated Key Agreement Phase. Fig.5 illustrates authenticated key agree- ment phase. The steps are performed as follows.
Authenticated Key Agreement Phase. After the successful login with TS, all three participants communicate for the secure key agreement with privacy preserved. Figure 4 shows the steps of it and the detailed processes are as follows.

Related to Authenticated Key Agreement Phase

  • Execution, Authentication, Delivery and Dating of Rights Certificates (a) The Rights Certificates shall be executed on behalf of the Company by any of its Chairman of the Board, President, Chief Executive Officer and Chief Financial Officer. The signature of any of these officers on the Rights Certificates may be manual or facsimile. Rights Certificates bearing the manual or facsimile signatures of individuals who were at any time the proper officers of the Company shall bind the Company, notwithstanding that such individuals or any of them have ceased to hold such offices either before or after the countersignature and delivery of such Rights Certificates.

  • Execution Completion Authentication and Delivery (a) The Notes shall be executed on behalf of the Issuer by one or more officers of the Issuer authorized to do so pursuant to one or more resolutions of the Issuer, whose signatures may be manual or facsimile (an "Authorized Officer"). Notes bearing the manual or facsimile signature of an Authorized Officer shall bind the Issuer, notwithstanding that such person no longer serves as the official so authorized to execute the Notes prior to the authentication and delivery of the Notes or was not such an official at the date of execution of such Notes. The Global Agent shall have no responsibility to the Issuer to determine by whom or by what means a facsimile signature may have been affixed on the Notes, or to determine whether any facsimile or manual signature is genuine.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!