Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Table 6
Security comparison with other 3PAKA schemes.
| Property | Chen et at.’s scheme [15] | Wang et al.’s scheme [16] | Farash et at.’s scheme [17] | Our scheme |
| Resistance to password guessing attacks | | | | | Resistance to verifier stolen attacks | | | N/A | | Key confirmation | | | | | Resistance to impersonation attacks | | | | | Anonymity | | | | | Resistance to tracking attacks | | | | | Efficiency of implementation | | | | |
|
|