Table 3: Comparison of security properties.

Security properties Chen et al.’s protocol Our protocol

Anonymity No Yes
Man-in-the-middle attack No Yes
DoS attack Yes Yes
Mutual authentication among three parties Yes Yes
Perfect forward secrecy Yes Yes
Provision for revocation of lost or stolen smart card No Yes
Insider attack Yes Yes
User friendliness No Yes
Replay attack Yes Yes