Research Article
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
Table 2
The security feature comparison among the schemes.
| | Kinds of attack | Lin[23] | Zhu[24] | Ours |
| | Password-guessing | ✘ | ✔ | ✔ | | Replay | ⌀1 | ✔ | ✔ | | User anonymity | ✔ | ⌀ | ✔ | | Impersonation | ✔ | ✔ | ✔ | | Man-in-the-middle | ⌀ | ⌀ | ✔ | | Parallel | ⌀ | ⌀ | ✔ | | Two-factor | ✘ | ✔ | ✔ | | Perfect secrecy session key | ⌀ | ✘ | ✔ |
|
|
The authors do not consider. |