Research Article
Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre
Table 3
Security features Comparisons.
| Security properties | Tsai and Lo [3] | He et al. [26] | Irshad et al. [27] | Mo et al. [28] | Our scheme |
| User anonymity | × | √ | √ | √ | √ | Resist server impersonation attack | × | √ | × | √ | √ | Resist offline guessing attack | √ | √ | √ | √ | √ | Resist stolen-verifier attack | √ | √ | √ | × | √ | Resist denial of service attack | √ | √ | √ | × | √ | Resist replay attack | √ | √ | √ | × | √ | Resist known session-specific temporary information attack | × | × | × | × | √ | Forward secrecy | √ | √ | √ | √ | √ | Three-factor secrecy | − | − | √ | − | √ | Efficiency for wrong password and biometric detection | × | × | √ | √ | √ | Offline RC | √ | √ | √ | − | √ | Single/multi server | Multiserver | Multiserver | Multiserver | Single-server | Multiserver | Cryptography primitives | Paring | Paring | Paring | ECC | ECC |
|
|