Research Article

An Efficient and Provably Secure Anonymous User Authentication and Key Agreement for Mobile Cloud Computing

Table 4

Comparison of security properties.

[22][26][27][28][24][29][25][30]Ours

No password verifier-tableN/Axx
Password friendlyN/Axxxx
No password exposureN/Ax
No smart card loss attackxN/Axxxx
Resistance to known attacksxxxxxx
Sound repairabilityxN/Axxxxxx
Provision of key agreementx
No clock synchronizationxx
Timely typo detectionN/Axxx
Mutual authentication
User anonymityxxx
Forward secrecyxxxx