From: An anonymous authenticated key-agreement scheme for multi-server infrastructure
Scheme: | Proposed | Liao and Wang [20] | Hsiang and Shih [21] | Lee et al. [22] | Chen and Lee [23] | Irshad et al. [25] |
---|---|---|---|---|---|---|
Immune to smart card stolen attack | Yes | Yes | Yes | Yes | No | Yes |
Efficient password modification | Yes | Yes | Yes | No | No | Yes |
Ensuring anonymity | Yes | Yes | Yes | Yes | Yes | No |
Immune to insider attack | Yes | No | Yes | Yes | Yes | Yes |
Immune to trace attack | Yes | Yes | Yes | Yes | No | Yes |
Immune to impersonation attack | Yes | No | No | No | No | Yes |
Support mutual authentication | Yes | No | No | No | Yes | Yes |
Repair ability | Yes | Yes | No | No | Yes | Yes |
Supports session key security | Yes | Yes | Yes | Yes | No | Yes |
Immune to offline password guessing attack | Yes | Yes | Yes | No | Yes | Yes |
Immune to KCI attack | Yes | Yes | No | Yes | No | Yes |