Research Article

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials

Table 2

The notations.

SymbolDescription

SThe server
UA user
PWU’s password
IDU’s identity
sThe master key of the server
xA variable with value in [−1,1]
Exclusive-OR operation
h()A one-way hash function
||String concatenation
T1, T2, T3The timestamps
tA random integer
SKSession key
Ek()Symmetric encryption algorithm with k
Dk()Symmetric decryption algorithm with k