Table 1: Notations used in this paper.


𝐶 𝑖 User i
𝑅 𝑖 Trusted registration centre i
𝑆 𝑖 Server i
𝐴 𝑖 Attacker i
P W 𝑖 Password of the user i
I D 𝑖 Identity of the user i
𝐵 𝑖 Biometric template of the user i
h( )A secure hash function
𝑋 𝑠 A secret information maintained by the server
𝑥 𝑦 x concatenates with y
𝑥 𝑦 Exclusive-OR operation of x and y