Research Article
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash Function
Table 3
Summary of the authentication phase of our scheme.
| User /smart card | Remote server |
| | Checks the validity of . | | If it holds, computes | | , | | , | | and . | | Checks if . If it holds, | | computes , | | , | | and | | . | | | Checks the validity of . | (via a public channel) | If it holds, computes | | , | | , | | , | | and | | . Checks if . If it | | holds, updates and . Computes | | . | | | | | (via a public channel) | Computes | | . | | Checks if . If it holds, | | authenticates . | Computes . | Computes . |
|
|