Research Article

Applying LU Decomposition of Matrices to Design Anonymity Bilateral Remote User Authentication Scheme

Table 3

Functionality comparison between our scheme and Tseng et al.'s scheme.

ā€‰ Our scheme Tseng et al.'s scheme [27]

Protect user anonymity Yes No
Resist impersonation attack Yes Yes
Resist insider attack Yes No
Resist stolen smart card attack Yes No
Resist server spoofing attack Yes Yes
Efficient for password verification Yes No
Mutual authentication Yes Yes
Session key agreement Yes Yes