Research Article

Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

Table 2

Security properties comparison.

Our scheme Yang and Chang’s scheme [15] Islam and Biswas’s scheme [16]

Mutual authentication Yes Yes Yes
Key agreement Yes Yes Yes
Forward secrecy Yes No Yes
User anonymity Yes No Yes
Server spoofing attack YesYesYes
Insider attackYesYesYes
Impersonation attackYesYes Yes
Stolen smart card attackYesN/A N/A
No key controlYes Yes Yes
Replay attackYes No Yes
No key controlYes NoNo