Research Article
Deniable Key Establishment Resistance against eKCI Attacks
Table 1
Protocol comparison.
| [Paper] protocol | Complexity | Rounds | eKCI resistance | Deniability |
| [6] KEA+ | 3 | 2 | — | | [6] KEA+C | 3 | 3 | — | | [7] NAXOS | 4 | 2 | — | | [28] NAXOS+ | 5 | 2 | — | | [10] E-NAXOS | 5 | 2 | — | | [8] CMQV | 3 | 2 | — | | [9] SMQV | 3 | 2 | — | | [12] Prot.1 | 3 | 2 | — | | [12] Prot.2 | 5 | 2 | — | | [29] AMA | 4 | 4 | — | | [30] MRI | 3 | 4 | — | | [4] HMQV | 3 | 3 | — | | [2] Mod. | 2 + + | 3 | — | Initiator | [2] Mod. | 2 + + | 4 | | Responder |
| [31] | 2 + + | 3 | | — | [31] | 2 + + | 4 | | — | [11] without NAXOS | 3 | 2 | ! | — | [17] BLS-HMQV | 4 | 3 | | — |
| mHMQV-1 | 5 | 3 | | Initiator | mHMQV-2 | 6 | 4 | | |
|
|