Research Article
A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture
| Security requirements | Our scheme | Kou et al.’s scheme [2] | Ying and Nayak’s scheme [36] | Xiong et al.’s scheme [11] | He and Wang’s scheme [4] | Odelu et al.’s scheme [5] |
| User anonymity | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Untraceability | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Decentralized registration | ✓ | ✗ | ✗ | ✓ | ✗ | ✗ | No smart card lose attack | ✓ | ✓ | ✓ | ✓ | ✗ | ✗ | Impersonation attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Replay attack | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | Man-in-the-middle attack | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ | Hierarchical access control | ✓ | ✓ | ✗ | ✗ | ✗ | ✗ |
|
|