Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Table 2
Security comparison with verifier-based 3PAKA schemes w/o server public keys.
| Property | Lee et al.’s scheme [8] | Wang-Mo’s scheme [9] | Kwon et al. ’s scheme [10] | Lin-Lee’s scheme [7] | Our scheme |
| Resistance to password guessing attacks | | | | | | Resistance to verifier stolen attacks | | | | | | Key confirmation | | | | | | Resistance to impersonation attacks | | | | | | Anonymity | | | | | | Resistance to tracking attacks | | | | | | Efficiency of implementation | | | | | |
|
|