Research Article

Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

Table 13

Comparison of properties.

Wang-Zhao Niu-Wang Proposed
protocol protocol protocol

Authentication
Blindness of secret keys
Blind key issuing
Non-PKI requirement
Replay attack resistance
MITM attack resistance
Empowered issuing
Independent key generation
Non-TTP requirement
Specific-key revocation
Storage-free choice