Research Article

Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment

Table 1

Notations used.

SymbolDescription

, , User, cloud server, registration authority
, Identity of and
Password of
Biometrics of
Session key between and
Hash function
Bio-hash function
||Concatenation
XOR operation
Private key of
Public key of