Research Article

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment

Table 2

Security comparison with verifier-based 3PAKA schemes w/o server public keys.

PropertyLee et al.’s
scheme [8]
Wang-Mo’s
scheme [9]
Kwon et al. ’s
scheme [10]
Lin-Lee’s
scheme [7]
Our scheme

Resistance to password guessing attacks
Resistance to verifier stolen attacks
Key confirmation
Resistance to impersonation attacks
Anonymity
Resistance to tracking attacks
Efficiency of implementation