“…Authentication schemes were proposed for IoT applications [6,11,12], VANET [13,18,19], and cloud computing applications [13,14]. Users in these authentication schemes [5,6,[11][12][13][14][15][16][17][18][19] need to register with a trusted authentication server, and be authenticated online when accessing services, where users may be authenticated by the trusted authentication server directly or by other servers with the trusted authentication server's help. In the proposed scheme, a user/executive can be authenticated offline, and no extra component is needed.…”