Research Article
Improved ECC-Based Three-Factor Multiserver Authentication Scheme
| Attack methods | Ali and Pal’s scheme [34] | Wang et al.’s scheme [36] | Our scheme |
| User anonymity | √ | × | √ | Offline password attacks | √ | √ | √ | Stolen smart card attacks | √ | √ | √ | Known session-specific temporary information attack | × [36] | × | √ | User impersonation attack | × [36] | × | √ | Server impersonation attack | × [36] | × | √ | Replay attacks | √ | √ | √ | Perfect forward secrecy | × [36] | √ | √ | Three-factor secrecy | × [36] | √ | √ |
|
|
Note. √, able to overcome the attack, and ×, unable to overcome the attack.
|