Research Article
Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
| Scheme | Type | Difficulty problem | Verification element | Replay attack | Privacy of session key | A/B/S |
| Liu et al. [2] | 2-party | Chebyshev chaotic map | No | Yes | Null | 2/1/- | Zhang et al. [14] | 3-party | DDH assumption | Yes | No | Yes | 2/2/4 | Yu et al. [17] | 3-party | LWE | No | Yes | No | 1/1/2 | Shu et al. [23] | 3-party | RLWE | Yes | Yes | Yes | 3/4/2 | Ours | 3-party | RLWE | Yes | Yes | Yes | 1/1/1 |
|
|