Research Article
Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme
Table 1
Notations used in this paper.
| | The server | | User | | The identity of user | | The password of user | | The server's secret key | | The authenticated session key shared between the server and | | The number of users that could be supported by the system | | A secret symmetric matrix with LU decomposition generated by the server | | Matrix 's LU decomposition such that | | The timestamp | | The expected time interval for transmission delay | | One-way hash function | | Two big prime numbers generated according to the requirement as in Section 2.2 | | A generator of order |
|
|