Research Article

A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment

Table 3

Security requirements.

S1: mutual authentication, and should authenticate each other to ensure their eligibility.

S2: user anonymity can neither compute the identity of nor link the message flows to .

S3: key agreement and should share a session key for further communication.

S4: forward secrecyEven gets the long term secret key , still cannot compute the session key.

S5: password friendlyThe user can select and change his password locally.

S6: sound repairability can revoke the breached smart card and re-register with the same identity.

S7: no stolen-verifier attackEven stores a verifier table, gains no benefits from it.

S8: no insider attackThe participants with the message their know cannot conduct an attack.

S9: no dictionary attackWith all the abilities in Table 2, still cannot guess the and .

S10: no replay attack cannot replay the eavesdropped messages to conduct an attack.

S11: no parallel session attack may construct multi-session simultaneously, but gains no benefits from it.

S12: no desynchronization attackOn the one hand, the scheme should not suffer from desynchronization attack
On the other hand, it needs not to synchronize the clock.

S13: no impersonation attack cannot impersonate the user or any other participants. It needs to note that (1) here cannot breach the smart card, while in dictionary attack has that capability; (2) can be a legitimate user or server.

S14: no known key attackKnowing the current session keys, cannot compute other session key in the future or in the past.