Research Article
Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model
Table 1
Security proof comparison.
| Protocol | Idealized assumption | Adversary capability | Resistance to UDOD attacks |
| Our protocol | None | Not restricted | Proven | GPAKE [21] | None | Restricted from corrupting parties | No [4] | NGPAKE [4] | None | Not proven | Lin and Hwang [7] | Random oracles | Not restricted | Not proven | Wu et al. [8] | Random oracles | Not restricted | Not proven |
|
|
Resistance to undetectable online dictionary attacks.
|