“…KE protocols using a password avoid complicated key management and the password is easy to remember, so many client-server models use the password mechanism to verify the user's identity [6−11] . In 2007, Feng also mentioned a modular approach to design the password-based security protocols [12] . This kind of protocol is convenient for the user since he only needs to provide the password.…”