Research Article

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials

Table 1

Cryptographic methodologies and drawbacks of the existing schemes and the proposed schemes.

Fan et al. [22]Juang et al. [23]Sun et al. [24]Li et al. [25]Guo et al. [19]Lin [20]Lee [21]Proposed TAKACP protocols

Cryptographic methodologiesSymmetric encryption Rabin’s public-key cryptosystemSymmetric encryption ECCSymmetric encryption ECCPublic-key cryptosystem ECCSymmetric encryption chaotic map on the interval [−1,1]Symmetric encryption chaotic map on the interval [−1,1]Symmetric encryption chaotic map on the interval (−∞,+∞)Symmetric encryption, Rabin’s public-key cryptosystem chaotic map on the interval [−1,1]/( −∞,+∞)
DrawbacksInsecure, no privacy preservationInsecure, no privacy preservationTraceabilityInsecure, no privacy preservationTraceabilityTraceabilityNo free password updatingNone