Research Article

A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity

Table 6

Security comparison of the scheme.

S1S2S3S4S5S6S7S8S9S10Security

Wu et al. [18]××8
Grope and Hwang [17]×××7
Wen et al. [13]××××××4
Jiang et al. [12]××××6
Farash et al. [16]××××××××2
Alzahrani et al. [31]×9
Lu et al. [34]×××7
Lee et al. [20]×××8
Ostad-Sharif et al. [33]×9
Khatoon and Singh Thakur [32]×9
Ours10

S1: conditional anonymity, S2: forward security, S3: untraceability, S4: mutual authentication, S5: resistance to replay attacks, S6: resistance to man-in-the-middle attack, S7: user login authentication, S8: resistance to device-stealing attacks, S9: resistance to privileged-inside attack, S10: secure user password change.