Research Article

An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment

Table 6

Security comparison with other 3PAKA schemes.

PropertyChen et at.’s scheme [15]Wang et al.’s scheme [16]Farash et at.’s scheme [17]Our scheme

Resistance to password guessing attacks
Resistance to verifier stolen attacksN/A
Key confirmation
Resistance to impersonation attacks
Anonymity
Resistance to tracking attacks
Efficiency of implementation