Research Article
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment
Table 3
Results of security analysis of related schemes.
| Security properties | He [22] | Kumari [25] | Feng [26] | Ali [27] | Our scheme |
| Resist offline password guessing attack | √ | √ | √ | √ | √ | User anonymity | √ | √ | √ | √ | √ | Resist denial of service attack | √ | √ | √ | × | √ | Resist user impersonation attack | √ | √ | √ | × | √ | Resist server impersonation attack | √ | × | √ | × | √ | Forward secrecy | √ | √ | √ | × | √ | Resist known session-specific temporary information attack | × | × | × | × | √ | Efficient wrong password and biometric detection | × | √ | √ | √ | √ | Resist privileged insider attack | √ | √ | √ | × | √ | Three-factor secrecy | √ | × | × | × | √ |
|
|