Research Article
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials
| ā | S1 | S2 | S3 | S4 | S5 | S6 | S7 | S8 | S9 | S10 |
| Fan et al. [22] | Yes | No | Yes | Yes | Yes | Yes | No | Yes | Yes | No | Juang et al. [23] | No | No | Yes | Yes | No | Yes | No | Yes | Yes | No | Sun et al. [24] | No | Anonymity-alone | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Li et al. [25] | No | No | Yes | Yes | Yes | Yes | No | Yes | Yes | No | Maitra [27] | No | Medium unlinkability | Yes | No | Yes | Yes | Yes | Yes | Yes | No | Chaudhry et al. [28] | Yes | No | Yes | Yes | Yes | No | # | Yes | Yes | No | Guo et al. [19] | Yes | Anonymity-alone | Yes | Yes | No | Yes | No | Yes | Yes | No | Lin [20] | Yes | Weak unlinkability | Yes | Yes | No | Yes | No | Yes | Yes | No | Lee [21] | Yes | Medium unlinkability | Yes | Yes | Yes | Yes | No | Yes | Yes | No | Irshad et al. [29] | Yes | No | Yes | Yes | Yes | Yes | Yes | Yes | Yes | No | Irshad et al. [30] | No | Medium unlinkability | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Our protocols | Yes | Medium unlinkability | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
|
|
S1: No password table and verification table; S2: User privacy-preserving; S3: Mutual authentication; S4: Contributory property of key agreement; S5: Session key security; S6: Two-factor secrecy; S7: Free updating of password; S8: Resistance to password guessing attacks; S9: Resistance to replay attack. S10: Key confirmation.
|