Research Article
A General Architecture for Multiserver Authentication Key Agreement with Provable Security
Table 2
Comparative summary: computation costs and analysis of various attacks.
| Protocols | Sood et al. [28] | Lee et al. [27] | Li et al. [29] | proposed protocol |
| User side | | | | | Server side | | | | | RC side | | | | | total | | | | | Resist Insider Attack | yes | yes | yes | yes | Resist Off-line Password Guessing Attack | yes | yes | yes | yes | Resist User Impersonation Attack | no | yes | yes | yes | Resist Server Spoofing Attack | yes | yes | yes | yes | Resist Stolen Card Attack | no | yes | no | yes | Resist Modification Attack | yes | no | yes | yes | Resist Man-in-the-middle Attack | yes | no | no | yes |
|
|