Research Article
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
Table 2
The capacities of the adversary.
| | can intercept, modify, delete, and resend the messages between the users and the servers over the open channel. |
| | can enumerate all the items in the password space and identity space simultaneously. |
| | When cryptanalyzing a scheme, can know the identity of . |
| | knows the identity of . |
| | can learn the password of by a malicious card reader, or extract the parameters from the smart, but cannot achieve both. |
| | When evaluating forward secrecy, knows the long term secret key of the register center. |
|
|