Research Article

Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

Table 1

Notations used in this paper.


𝐶 𝑖 User i
𝑅 𝑖 Trusted registration centre i
𝑆 𝑖 Server i
𝐴 𝑖 Attacker i
P W 𝑖 Password of the user i
I D 𝑖 Identity of the user i
𝐵 𝑖 Biometric template of the user i
h( )A secure hash function
𝑋 𝑠 A secret information maintained by the server
𝑥 ‖ 𝑦 x concatenates with y
𝑥 ⊕ 𝑦 Exclusive-OR operation of x and y