From: An improved authenticated key agreement protocol for telecare medicine information system
Security attributes/schemes | Li and Hwang (2010) | Li et al. (2011) | Truong et al. (2012) | Awasthi and Srivastava (2013) | Dheerendra et al. (2014) | He and Wang (2014) | Vanga et al. (2015) | Ours |
---|---|---|---|---|---|---|---|---|
Provide user anonymity | N | N | Y | Y | N | N | Y | Y |
Insider attack | N | Y | Y | Y | N | Y | Y | Y |
Stolen smart card attack | Y | Y | Y | Y | N | Y | Y | Y |
Replay attack | Y | Y | Y | Y | Y | N | Y | Y |
Off-line password guessing attack | Y | Y | Y | N | Y | Y | Y | Y |
Mutual authentication | N | Y | Y | N | Y | Y | Y | Y |
Known session-specific temporary information attack | N | N | N | N | N | N | Y | Y |
Perfect forward secrecy | N | N | N | N | N | Y | Y | Y |
Impersonation attack | N | N | N | N | N | N | Y | Y |
Provide lost smartcard revocation | N | N | N | N | N | N | Y | Y |
Server spoofing attack | N | N | N | N | N | Y | Y | Y |
Efficient login phase | N | N | N | Y | Y | Y | Y | Y |
Efficient password change phase | N | N | N | N | Y | Y | Y | Y |
Biometric update phase | N | N | N | N | N | Y | Y | Y |