Research Article

A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture

Table 7

Security comparison.

Security requirementsOur schemeKou et al.’s scheme [2]Ying and Nayak’s scheme [36]Xiong et al.’s scheme [11]He and Wang’s scheme [4]Odelu et al.’s scheme [5]

User anonymity
Untraceability
Decentralized registration
No smart card lose attack
Impersonation attack
Replay attack
Man-in-the-middle attack
Hierarchical access control