Research Article

Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography

Table 2

Comparisons of functionalities.

ā€‰ RG1 RG2 RG3 RG4 RG5 RG6 RG7 RG8 PKI

[6] No Yes No No No Yes No No Yes
[10] Yes Yes No No No No Yes No Yes
[13] Yes Yes No Yes No Yes Yes Yes Yes
Ours Yes Yes Yes Yes Yes Yes Yes Yes No