Skip to main content

Table 2 Comparison of security parameters

From: An anonymous authenticated key-agreement scheme for multi-server infrastructure

Scheme:

Proposed

Liao and Wang [20]

Hsiang and Shih [21]

Lee et al. [22]

Chen and Lee [23]

Irshad et al. [25]

Immune to smart card stolen attack

Yes

Yes

Yes

Yes

No

Yes

Efficient password modification

Yes

Yes

Yes

No

No

Yes

Ensuring anonymity

Yes

Yes

Yes

Yes

Yes

No

Immune to insider attack

Yes

No

Yes

Yes

Yes

Yes

Immune to trace attack

Yes

Yes

Yes

Yes

No

Yes

Immune to impersonation attack

Yes

No

No

No

No

Yes

Support mutual authentication

Yes

No

No

No

Yes

Yes

Repair ability

Yes

Yes

No

No

Yes

Yes

Supports session key security

Yes

Yes

Yes

Yes

No

Yes

Immune to offline password guessing attack

Yes

Yes

Yes

No

Yes

Yes

Immune to KCI attack

Yes

Yes

No

Yes

No

Yes