The authentication scheme is an important cryptographic mechanism, through which two communication parties
could authenticate each other in the open network environment. To satisfy the requirement of practical applications, many
authenticationschemes using passwords and smart cards have been proposed. However,passwords might be divulged or forgotten,
and smart cards might be shared, lost, or stolen.