Research Article

A General Architecture for Multiserver Authentication Key Agreement with Provable Security

Table 2

Comparative summary: computation costs and analysis of various attacks.

ProtocolsSood et al. [28]Lee et al. [27]Li et al. [29]proposed protocol

User side
Server side
RC side
total
Resist Insider Attackyesyesyesyes
Resist Off-line Password Guessing Attackyesyesyesyes
Resist User Impersonation Attacknoyesyesyes
Resist Server Spoofing Attackyesyesyesyes
Resist Stolen Card Attacknoyesnoyes
Resist Modification Attackyesnoyesyes
Resist Man-in-the-middle Attackyesnonoyes