Research Article

A Blockchain-Based User Authentication Scheme with Access Control for Telehealth Systems

Table 4

Security comparison.

Security requirements[34][21][6]Ours

Single registration
No online registration center
Mutual authentication
User anonymity
Untraceability
Session key agreement
Perfect forward secrecy
Two-factor security with PUF
Access control
Resistance of known attacks