Research Article

Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

Table 2

Performance comparison of our scheme and Tseng et al.'s scheme.

ā€‰ Our scheme Tseng et al.'s scheme [27]

Registration phase
Login phase
Verification and key agreement phase

Total