Research Article
Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem
Table 2
Security properties comparison.
| | Our scheme |
Yang and Chang’s scheme [15] |
Islam and Biswas’s scheme [16] |
| Mutual authentication | Yes | Yes | Yes | Key agreement | Yes | Yes | Yes | Forward secrecy | Yes | No | Yes | User anonymity | Yes | No | Yes | Server spoofing attack | Yes | Yes | Yes | Insider attack | Yes | Yes | Yes | Impersonation attack | Yes | Yes | Yes | Stolen smart card attack | Yes | N/A | N/A | No key control | Yes | Yes | Yes | Replay attack | Yes | No | Yes | No key control | Yes | No | No |
|
|