Research Article
A Novel RLWE-Based Anonymous Mutual Authentication Protocol for Space Information Network
Table 1
Comparison of security attributes.
| Security attribute | [21] | [22] | [23] | [24] | [10] | Ours |
| Mutual authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Identity anonymity | ✗ | ✓ | ✓ | ✓ | ✓ | ✓ | Key establishment | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Perfect forward secrecy | ✓ | ✗ | ✗ | ✓ | ✓ | ✓ | Login authentication | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | Insider attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Modification attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Eavesdropping attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Impersonation attack | ✓ | ✗ | ✓ | ✗ | ✓ | ✓ |
|
|