Research Article
Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment
Table 2
Comparisons of security properties with related works.
| Security Properties | Li et al. [47] | Pippal et al. [40] | Yeh [15] | Truong et al. [16] | Ours |
| Insider attack | ✘ | ✔ | ✔ | ✔ | ✔ | Replay attack | ✔ | ✔ | ✔ | ✔ | ✔ | Known-key attack | ✔ | ✔ | ✔ | ✔ | ✔ | Mutual authentication | ✔ | ✔ | ✘ | ✔ | ✔ | Session key agreement | ✔ | ✔ | ✘ | ✔ | ✔ | Perfect forward secrecy | ✘ | ✔ | ✔ | ✔ | ✔ | Two-factor authentication | ✘ | ✘ | ✘ | ✘ | ✔ | User impersonation attack | ✘ | ✘ | ✘ | ✘ | ✔ | Server impersonation attack | ✘ | ✘ | ✔ | ✘ | ✔ | Offline password guessing attack | ✘ | ✘ | ✘ | ✘ | ✔ |
|
|
Note.✔ means that the scheme can provide the corresponding security property, and ✘ indicates that it cannot achieve this.
|