Research Article
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
Table 6
Security comparison of the scheme.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
S1: conditional anonymity, S2: forward security, S3: untraceability, S4: mutual authentication, S5: resistance to replay attacks, S6: resistance to man-in-the-middle attack, S7: user login authentication, S8: resistance to device-stealing attacks, S9: resistance to privileged-inside attack, S10: secure user password change. |