Research Article

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

Table 2

Notations and descriptions.

NotationsDescriptions

The registration center
The j-th server
The i-th user
The attacker
The public key of
Hash function
Biohash function
User identity
User’s password
User’s biometrics
Smart card
Session key
Concatenation
Bitwise XOR
Symmetric encryption/decryption algorithm with key