Research Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Table 7
The security feature comparison among the schemes.
| Schemes | Li [11] | Qu [12] | Amin [13] | Jangirala [18] | Han [19] | Ours |
| Password-guessing | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | User’s anonymity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Two-factor | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | Known session-specific temporary information | ✗ | ✓ | ✓ | ✗ | ✗ | ✓ | Session-key perfect forward | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | User impersonation | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | Server impersonation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Man-in-the-middle | ✓ | ✞1 | ✞1 | ✞1 | ✞1 | ✓ | Replay | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Parallel session | ✞1 | ✞1 | ✞1 | ✞1 | ✞1 | ✓ |
|
|
1Untouched.
|