Skip to main content
. 2025 Dec 28;16:3660. doi: 10.1038/s41598-025-33685-1

Table 3.

10 Criteria for evaluating authentication schemes.

Category ID Criteria Definition
Ideal attributes IInline graphic Password friendly

Users can freely select

and locally modify their

passwords

IInline graphic Sound repairability

Users can join

dynamically, and smart

card can be revoked

IInline graphic Key agreement

Users and task publishers

must establish a session

key after authentication

IInline graphic Mutual authentication

All parties should

authenticate each

other’s identities

IInline graphic

No password verifier

table

Only users store their

password-related data

Security attributes SInline graphic User anonymity

Adversaries cannot

deduce or track users’

identities

SInline graphic

No password

exposure

Privileged participants

(e.g., KGC administrators)

cannot access user

passwords during

registration

SInline graphic Forward secrecy

Even if KGC’s long-term

key is compromised, the

session key remains

secure

SInline graphic

Resistance to known

attacks

The protocol withstands

impersonation, MITM,

replay, stolen verifier,

and DoS attacks

SInline graphic

Resistance to smart

card loss attack

The protocol remains

secure even if a smart

card is lost