“…In Lamport's scheme, password table was used to verify the legitimacy of users, but if this password table is compromised, stolen, or modified by an adversary, then the system could be partially or completely compromised [6], [7]. Some more recent smart card based password authentication schemes have been proposed in [8], [9]and many of the schemes have been broken as shown by [10], [11], [7]. Shoup-Rubin [12] proposed extension of Bellare-Rogaway model [13]which is based on three party key distribution protocol and smartcard is used to store the long term secret keys.…”