Research Article
An Anonymous User Authentication with Key Agreement Scheme without Pairings for Multiserver Architecture Using SCPKs
Table 2
Functionality and security comparison with the related schemes.
| Functionality | Ours | [18] | [17] | [12] | [11] | [9] | [8] |
| No repetitive registration | Y | Y | Y | Y | Y | Y | Y | No verification table | Y | Y | Y | Y | Y | Y | Y | Mutual authentication with key agreement | Y | Y | N | N | Y | N | N | No synchronization clock | Y | Y | N | Y | Y | N | Y | Change password freely | Y | Y | Y | Y | Y | Y | Y | Anonymity | Y | N | N | Y | Y | Y | Y | Perfect forward and backward secrecy | Y | Y | N | N | Y | N | N | No key control | Y | Y | Y | Y | Y | Y | Y | Known session key security | Y | Y | Y | Y | Y | Y | Y | Impersonation attack | Y | N | N | N | N | N | N | Stolen smart card attack | Y | Y | N | N | N | N | N | Off-line password guessing attack | Y | N | N | Y | N | N | N | Man-in-the-middle attack | Y | Y | N | Y | Y | N | N | Server spoofing attack | Y | N | N | Y | Y | Y | N | Local password verification | Y | N | N | Y | Y | Y | Y |
|
|