Research Article

Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

Table 1

Notations used in this paper.

The server
User
The identity of user
The password of user
The server's secret key
The authenticated session key shared between the server and
The number of users that could be supported by the system
A secret symmetric matrix with LU decomposition generated by the server
Matrix 's LU decomposition such that
The timestamp
The expected time interval for transmission delay
One-way hash function
Two big prime numbers generated according to the requirement as in Section 2.2
A generator of order