Research Article

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials

Table 6

Security comparison.

ā€‰S1S2S3S4S5S6S7S8S9S10

Fan et al. [22]YesNoYesYesYesYesNoYesYesNo
Juang et al. [23]NoNoYesYesNoYesNoYesYesNo
Sun et al. [24]NoAnonymity-aloneYesYesYesYesYesYesYesNo
Li et al. [25]NoNoYesYesYesYesNoYesYesNo
Maitra [27]NoMedium unlinkabilityYesNoYesYesYesYesYesNo
Chaudhry et al. [28]YesNoYesYesYesNo#YesYesNo
Guo et al. [19]YesAnonymity-aloneYesYesNoYesNoYesYesNo
Lin [20]YesWeak unlinkabilityYesYesNoYesNoYesYesNo
Lee [21]YesMedium unlinkabilityYesYesYesYesNoYesYesNo
Irshad et al. [29]YesNoYesYesYesYesYesYesYesNo
Irshad et al. [30]NoMedium unlinkabilityYesYesYesYesYesYesYesYes
Our protocolsYesMedium unlinkabilityYesYesYesYesYesYesYesYes

S1: No password table and verification table; S2: User privacy-preserving; S3: Mutual authentication; S4: Contributory property of key agreement; S5: Session key security; S6: Two-factor secrecy; S7: Free updating of password; S8: Resistance to password guessing attacks; S9: Resistance to replay attack. S10: Key confirmation.