Efficient User Authentication and Key Agreement With User Privacy ProtectionUser Authentication and Key Agreement • May 7th, 2008
Contract Type FiledMay 7th, 2008to retrieve IDi. He then computes αi = h(x||IDi) and decrypts the message Eαi (ruk, h(N1||ruk||λi,k)) and ver- ifies if the authentication tag h(N1||ruk||λi,k) is valid. If it is valid, S sends a nonce N2 and the encrypted message