Skip to main content
. 2015 Aug 11;10(8):e0131368. doi: 10.1371/journal.pone.0131368

Table 3. Login and authentication phases of the proposed user authentication scheme.

User Ui/Smartcard Server S
User Ui:
Insert ⟨ID i, PW i
Smartcard:
Compute B i = H(ID i∣∣PW i), A i = C iB i
Compute Di = H(A i∣∣B i)
If (DiDi)
  terminate the session
Else
 compute c i = c i + 1
Choose aRZn*
Compute M 1 = (ID i∣∣A i∣∣a∣∣c i)2 mod n
(via a public channel)M1
Obtain ID i, A i, a, c i from M 1
Retrieve ⟨ID i, ci, b i⟩ from database
If (cici)
  terminate the session
Else
 update ⟨ID i, ci, b i⟩ to ⟨ID i, c i, b i
Compute Ai = H(ID i∣∣K∣∣b i)
If (AiAi)
  terminate the session
Else
 select bRZn*
Compute d = ab and
Session key SK = H(ID i∣∣a∣∣b∣∣A i)
Compute M 2 = H(ID i∣∣A i∣∣d∣∣SK)
(via a public channel){d,M2}
Smartcard:
Compute b = da and
Session key SK = H(ID i∣∣a∣∣b∣∣A i)
Compute M2 = H(ID i∣∣A i∣∣d∣∣SK)
If (M2M2)
  terminate the session
Else
 authenticate S and
Accept SK as session key