Research Article

Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment

Table 2

The security feature comparison among the schemes.

Kinds of attackLin[23]Zhu[24]Ours

Password-guessing
Replay1
User anonymity
Impersonation
Man-in-the-middle
Parallel
Two-factor
Perfect secrecy session key

The authors do not consider.