Research Article
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials
Table 1
Cryptographic methodologies and drawbacks of the existing schemes and the proposed schemes.
| | Fan et al. [22] | Juang et al. [23] | Sun et al. [24] | Li et al. [25] | Guo et al. [19] | Lin [20] | Lee [21] | Proposed TAKACP protocols |
| Cryptographic methodologies | Symmetric encryption Rabin’s public-key cryptosystem | Symmetric encryption ECC | Symmetric encryption ECC | Public-key cryptosystem ECC | Symmetric encryption chaotic map on the interval [−1,1] | Symmetric encryption chaotic map on the interval [−1,1] | Symmetric encryption chaotic map on the interval (−∞,+∞) | Symmetric encryption, Rabin’s public-key cryptosystem chaotic map on the interval [−1,1]/( −∞,+∞) | Drawbacks | Insecure, no privacy preservation | Insecure, no privacy preservation | Traceability | Insecure, no privacy preservation | Traceability | Traceability | No free password updating | None |
|
|