Common use of Setup Phase Clause in Contracts

Setup Phase. In this phase, any user Ui has its identity IDi, and pub- lic key (x, TSi (x)) and a secret key Si based on Cheby- shev chaotic maps, a chaotic maps-based one-way hash function h(·) [35], and a pair of secure symmetric encryp- tion/decryption functions EK()/DK() with key K. The concrete notation used hereafter is shown in Table 1.

Appears in 1 contract

Sources: Group Key Agreement Scheme

Setup Phase. In this phase, any user each Ui has maintains its identity IDi, and pub- lic key (x, TSi (x)) and a secret key Si based on Cheby- shev chaotic mapsIDi , a chaotic maps-based one-way hash function hH(·.), a secret key Si and public key (x, TSi (x)) [35]based on Chebyshev chaotic maps, a random number generator, and a pair of secure symmetric encryp- tionencryption/decryption functions EK()/DK() EK[.]/DK[.] with the key K. The concrete notation used hereafter is shown in Table 1.K.

Appears in 1 contract

Sources: Group Key Agreement Scheme