Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Table 4
Security comparison with RSA-based 3PAKA schemes.
| Property | Chang et al.’s scheme [11] | Tso’s scheme [12] | Farash and Attari’s scheme [13] | Deebak et al.’s scheme [14] | Our scheme |
| Resistance to password guessing attacks | | | | | | Resistance to verifier stolen attacks | N/A | N/A | N/A | | | Key confirmation | | | | | | Resistance to impersonation attacks | | | | | | Anonymity | | | | | | Resistance to tracking attacks | | | | | | Efficiency of implementation | | | | | |
|
|