Research Article
Enhancing Transaction Security for Handling Accountability in Electronic Health Records
Table 2
Security comparison of the proposed protocol and existing protocols.
| Security aspects | [9] | [11] | [19] | [12] | [13] | [14] | [20] | [21] | [15] | [16] | Proposed |
| Confidentiality | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Integrity | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Mutual authentication | No | No | No | No | No | No | Yes | Yes | No | Yes | Yes | Authorization | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Nonrepudiation | No | No | No | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | Replay attack | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Man-in-the-middle | Yes | Yes | Yes | Yes | Yes | No | Yes | Yes | Yes | Yes | Yes | Dispute resolution | No | No | No | No | No | No | Yes | Yes | No | Yes | Yes |
|
|