Research Article
An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity
Table 1
Comparison of security.
| Scheme | Lee et al.’s [20] | Xie et al.’s [26] |
Farash and Attari’s [30] | Li et al.’s [31] | Lee et al.’s [25] |
Niu and Wang’s [32] | Ours |
| Forward secrecy | √ | √ | √ | √ | √ | √ | √ | Backward secrecy | √ | | | | | √ | √ | Resistance to the replay attack | √ | √ | √ | √ | √ | √ | √ | Resistance to the MIM attack | | √ | √ | √ | √ | √ | √ | Mutual anonymity | √ | | | | | | √ | Strong anonymity | | | | | | | √ |
|
|