Research Article

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment

Table 4

Security comparison with RSA-based 3PAKA schemes.

PropertyChang et al.’s scheme [11]Tso’s scheme [12]Farash and Attari’s scheme [13] Deebak et al.’s scheme [14]Our scheme

Resistance to password guessing attacks
Resistance to verifier stolen attacksN/AN/AN/A
Key confirmation
Resistance to impersonation attacks
Anonymity
Resistance to tracking attacks
Efficiency of implementation