Page 70 - IJEEE-2023-Vol19-ISSUE-1
P. 70

66 |                                                                                                             Fareed & Yassin
                                                             Step16. 3DD# compares (33F<,--', 3F<,--') if so, then
Step13. 3DD# receives and decrypts P based on                computes E;F_;3E	+# = G;HD+4%&&' (;3E+#	) then go to
IG;HD+)%&&$ (P) and finds the ;3E+#	 on the local            next step, otherwise terminate this phase.
database;                                                    Step 17. 3DD# sends E;F_;3E	+# to 3DD0.
if a match is found, it then calculates E	,--' 	 = (3DD012)  Step 18. 3DD0 receives E;F_;3E	+# and decrypts based on
and sends it to 2AD.                                         ;3E+#	 =IG;HD+)%&&' (E;F_;3E	+#).
Step14. 2AD receives the E	,--' to retrieve the F<,--', and  Step13. 3DD0 updates ;3E+#	 and sends I_;3E	+# =
calculate 3F<,--' 	 = 	h,-h(F<,--').                         G;HD+4%&&$ (;3E+#	) to 3DD#.
Step15. 3DD# receives ( F<,--', 3F<,--'	) and calculate      Step14. 3DD# decrypts and saves ;3E+#	 =
33F<,--' 	 = 	h,-h(F<,--').                                  IG;HD+)%&&$ (I_;3E	+#) to their local database. Fig.2.
                                                             shows the DGDB authentication.

Fig. 2. DGDB Authentication
   65   66   67   68   69   70   71   72   73   74   75