Research Article

Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity

Table 1

Notations.

Notations Description

The user
The server
Identity of
Password of
Biometric information of
Secret key of
Secret number generated by
Random number of th generated by
, Random number generated by
, Time-stamp values
One-way hash function
Bio-hash function
Concatenate operation
XOR operation