Advances, Systems and Applications
From: Admission control policy and key agreement based on anonymous identity in cloud computing
Scheme | MARL-ACP | Li et al. [16] | Tseng et al. [17] | Lu et al. [18] | Hana et al. [20] | Zhong et al. [22] |
---|---|---|---|---|---|---|
Immune to smart card stolen attack | Yes | Yes | Yes | Yes | No | No |
Efficient password modification | Yes | Yes | Yes | No | No | No |
Ensuring anonymity | Yes | Yes | Yes | Yes | Yes | Yes |
Immune to insider attack | Yes | Â | Yes | Yes | Yes | Yes |
Immune to trace attack | Yes | Yes | Yes | Yes | Yes | No |
Immune to impersonation attack | Yes | No | No | No | No | No |
Support mutual authentication | Yes | No | No | No | No | Yes |
Repair ability | Yes | Yes | No | No | Yes | Yes |
Supports session key security | Yes | Yes | Yes | Yes | Yes | No |
Immune to ofine password guess- ing attack | Yes | Yes | Yes | No | No | Yes |
Immune to KCI attack | Yes | Yes | Yes | Yes | Yes | No |