Research Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Table 7
The security feature comparison among the schemes.
| | Schemes | Li [11] | Qu [12] | Amin [13] | Jangirala [18] | Han [19] | Ours |
| | Password-guessing | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | | User’s anonymity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | Two-factor | ✗ | ✓ | ✓ | ✗ | ✓ | ✓ | | Known session-specific temporary information | ✗ | ✓ | ✓ | ✗ | ✗ | ✓ | | Session-key perfect forward | ✗ | ✓ | ✗ | ✗ | ✓ | ✓ | | User impersonation | ✗ | ✗ | ✓ | ✗ | ✗ | ✓ | | Server impersonation | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | Man-in-the-middle | ✓ | ✞1 | ✞1 | ✞1 | ✞1 | ✓ | | Replay | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | | Parallel session | ✞1 | ✞1 | ✞1 | ✞1 | ✞1 | ✓ |
|
|
1Untouched.
|