Table 1.
Notations in Lwamo et al.’s scheme.
Table 2.
Notations in Zhou et al.’s scheme.
Table 3.
Notation used in proposed scheme.
Fig 1.
User registration phase in the proposed scheme.
Fig 2.
Server registration phase in the proposed scheme.
Fig 3.
Authentication and session key exchange phase of the proposed scheme.
Fig 4.
Role specification in HLPSL for the user U.
Fig 5.
Role specification in HLPSL for the server S.
Fig 6.
Role specification in HLPSL for the registration center R.
Fig 7.
Role specification in HLPSL for the session.
Fig 8.
Role specification in HLPSL for the environment.
Fig 9.
Role specification in HLPSL for the goal.
Fig 10.
The result of the analysis using OFMC back-end.
Fig 11.
The result of the analysis using CL-AtSe back-end.
Table 4.
Comparison of the computational cost between the proposed scheme and other schemes in the authentication and session key exchange phase.
Table 5.
Communication overhead of our proposed scheme.
Table 6.
Comparison of the computational cost between the proposed scheme and other schemes.
Table 7.
Comparative evaluation of the security function between the proposed scheme and other schemes.