Research Article

Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment

Table 7

The security feature comparison among the schemes.

SchemesLi [11]Qu [12]Amin [13]Jangirala [18]Han [19]Ours

Password-guessing
User’s anonymity
Two-factor
Known session-specific temporary information
Session-key perfect forward
User impersonation
Server impersonation
Man-in-the-middle1111
Replay
Parallel session11111

1Untouched.