Research Article

A Secure and Efficient ECC-Based Anonymous Authentication Protocol

Table 3

Results of security analysis.

SchemesNikooghadam [15]Luo [17]Xie [19]Amin [20]Maitra [22]Maitra [23]Islam [24]Our protocol

S1××××××
S2××
S3×××××
S4××××
S5××××
S6×
S7×××
S8××
S9×××
S10×

S1: Resist offline password guessing attack. S2: User anonymity. S3: Resist user impersonation attack. S4: Resist server impersonation attack. S5: Resist man-in-the-middle attack. S6: Resist desynchronization attack. S7: Forward secrecy. S8: Resist session key disclosure attack. S9: Efficient wrong password detection. S10: Resist insider attack.