Page 70 - IJEEE-2023-Vol19-ISSUE-1
P. 70
66 | Fareed & Yassin
Step16. 3DD# compares (33F<,--', 3F<,--') if so, then
Step13. 3DD# receives and decrypts P based on computes E;F_;3E +# = G;HD+4%&&' (;3E+# ) then go to
IG;HD+)%&&$ (P) and finds the ;3E+# on the local next step, otherwise terminate this phase.
database; Step 17. 3DD# sends E;F_;3E +# to 3DD0.
if a match is found, it then calculates E ,--' = (3DD012) Step 18. 3DD0 receives E;F_;3E +# and decrypts based on
and sends it to 2AD. ;3E+# =IG;HD+)%&&' (E;F_;3E +#).
Step14. 2AD receives the E ,--' to retrieve the F<,--', and Step13. 3DD0 updates ;3E+# and sends I_;3E +# =
calculate 3F<,--' = h,-h(F<,--'). G;HD+4%&&$ (;3E+# ) to 3DD#.
Step15. 3DD# receives ( F<,--', 3F<,--' ) and calculate Step14. 3DD# decrypts and saves ;3E+# =
33F<,--' = h,-h(F<,--'). IG;HD+)%&&$ (I_;3E +#) to their local database. Fig.2.
shows the DGDB authentication.
Fig. 2. DGDB Authentication