Research Article
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
Table 13
Comparison of properties.
| | Wang-Zhao | Niu-Wang | Proposed | | protocol | protocol | protocol |
| Authentication | | | | Blindness of secret keys | | | | Blind key issuing | | | | Non-PKI requirement | | | | Replay attack resistance | | | | MITM attack resistance | | | | Empowered issuing | | | | Independent key generation | | | | Non-TTP requirement | | | | Specific-key revocation | | | | Storage-free choice | | | |
|
|