Research Article

Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices

Table 1

Security comparison.

SchemeTypeDifficulty problemVerification elementReplay attackPrivacy of session keyA/B/S

Liu et al. [2]2-partyChebyshev chaotic mapNoYesNull2/1/-
Zhang et al. [14]3-partyDDH assumptionYesNoYes2/2/4
Yu et al. [17]3-partyLWENoYesNo1/1/2
Shu et al. [23]3-partyRLWEYesYesYes3/4/2
Ours3-partyRLWEYesYesYes1/1/1