Research Article

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials

Figure 2

Authenticated key exchange phase of the Lin protocol.