Research Article

An Efficient Chaotic Map-Based Authentication Scheme with Mutual Anonymity

Table 1

Comparison of security.

SchemeLee et al.’s [20] Xie et al.’s [26] Farash and Attari’s [30] Li et al.’s [31] Lee et al.’s [25] Niu and Wang’s [32] Ours

Forward secrecy
Backward secrecy
Resistance to the replay attack
Resistance to the MIM attack
Mutual anonymity
Strong anonymity