Research Article

Patient Family Binding and Authentication Scheme with Privacy Protection for E-Health System

Table 3

Functionality comparison.

[29][30][31][32][33]Ours

User anonymity
FM-MS authentication
Key agreement
Resistance to stolen verifier attack
Resistance to insider attack
Resistance to off-line guessing attack
Perfect forward security
Resistance to impersonation attack
Resistance to replay attack

: means can resist the attack successfully or provide the security property, : means cannot resist the attack successfully or cannot provide the security property, and : means not refereed.