Research Article
Improved ECC-Based Three-Factor Multiserver Authentication Scheme
Table 2
Notations and descriptions.
| Notations | Descriptions |
| | The registration center | | The j-th server | | The i-th user | | The attacker | | The public key of | | Hash function | | Biohash function | | User identity | | User’s password | | User’s biometrics | | Smart card | | Session key | | Concatenation | | Bitwise XOR | | Symmetric encryption/decryption algorithm with key |
|
|