Research Article

Secure Three-Factor Anonymous User Authentication Scheme for Cloud Computing Environment

Table 2

Security comparisons of the proposed scheme with related schemes in cloud computing environment.

SchemeWang et al. [15]Kumari et al. [16]Martínez-Peláez et al. [19]Wang et al. [30]Proposed

SP1
SP2
SP3
SP4
SP5
SP6
SP7
SP8
SP9
SP10
SP11
SP12
SP13
SP14

SP1: user anonymity; SP2: user untraceability; SP3: resistance to stolen-device attack; SP4: mutual authentication and session key agreement; SP5: verification of session key; SP6: resistance to user impersonation attack; SP7: resistance to replay attack; SP8: local user verification; SP9: resistance to privileged-insider attack; SP10: forward secrecy; SP11: resistance to stolen-verifier attack; SP12: user-friendly password change; SP13: providing identity update phase; SP14: providing three-factor user authentication.