Setup Phase. In this phase, any user Ui has its identity IDi, and pub- lic key (x, TSi (x)) and a secret key Si based on Cheby- shev chaotic maps, a chaotic maps-based one-way hash function h(·) [35], and a pair of secure symmetric encryp- tion/decryption functions EK()/DK() with key K. The concrete notation used hereafter is shown in Table 1.
Appears in 1 contract
Sources: Group Key Agreement Scheme
Setup Phase. In this phase, any user each Ui has maintains its identity IDi, and pub- lic key (x, TSi (x)) and a secret key Si based on Cheby- shev chaotic mapsIDi , a chaotic maps-based one-way hash function hH(·.), a secret key Si and public key (x, TSi (x)) [35]based on Chebyshev chaotic maps, a random number generator, and a pair of secure symmetric encryp- tionencryption/decryption functions EK()/DK() EK[.]/DK[.] with the key K. The concrete notation used hereafter is shown in Table 1.K.
Appears in 1 contract
Sources: Group Key Agreement Scheme