Note:- Since Google blog does not support mathematical symbols support (or maybe I could not find any method for that, so I am pasting all the appendices in the form of Pictures. They were originally written in MS Word.
First, we consider PAKE Protocols that are proven secure in the implicit authentication model. Our enhancement is essentially the transformation by Bellare, Rogaway, and Pointcheval [BPR00] that adds mutual authentication to a PAKE protocol.
First, we consider PAKE Protocols that are proven secure in the implicit authentication model. Our enhancement is essentially the transformation by Bellare, Rogaway, and Pointcheval [BPR00] that adds mutual authentication to a PAKE protocol.






















