A novel remote user authentication and key agreement scheme for mobile client- server environmentAuthentication and Key Agreement Scheme • March 26th, 2013
Contract Type FiledMarch 26th, 2013of k. To compute k, the adversary must know s or (sC, xC). However, without s and (sC, xC), computing k from Ppub and PKC − XC is as hard as solving the CDH problem. Therefore, Theorem 7 holds.