Research Article
An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing
Table 4
Comparison of security properties.
| | [22] | [26] | [27] | [28] | [24] | [29] | [25] | [30] | Ours |
| No password verifier-table | √ | N/A | √ | √ | √ | √ | x | x | √ | Password friendly | √ | N/A | √ | x | x | √ | x | x | √ | No password exposure | √ | N/A | √ | √ | √ | √ | x | √ | √ | No smart card loss attack | x | N/A | x | √ | x | x | x | √ | √ | Resistance to known attacks | √ | x | x | √ | x | x | x | x | √ | Sound repairability | x | N/A | x | x | x | x | x | x | √ | Provision of key agreement | √ | √ | √ | √ | √ | x | √ | √ | √ | No clock synchronization | √ | √ | x | x | √ | √ | √ | √ | √ | Timely typo detection | √ | N/A | √ | x | √ | √ | x | x | √ | Mutual authentication | √ | √ | √ | √ | √ | √ | √ | √ | √ | User anonymity | √ | x | √ | x | √ | √ | x | √ | √ | Forward secrecy | √ | √ | x | √ | x | √ | x | x | √ |
|
|