Research Article

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

Table 3

Security comparison.

Attack methodsAli and Pal’s scheme [34]Wang et al.’s scheme [36]Our scheme

User anonymity×
Offline password attacks
Stolen smart card attacks
Known session-specific temporary information attack× [36]×
User impersonation attack× [36]×
Server impersonation attack× [36]×
Replay attacks
Perfect forward secrecy× [36]
Three-factor secrecy× [36]

Note. √, able to overcome the attack, and ×, unable to overcome the attack.