Research Article
Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
Table 3
Comparison of the proposed scheme with other schemes.
| Security features | Yao et al. [24] | Masud et al. [25] | Bao and You [26] | Proposed |
| Resistance to brute force attack | √ | √ | √ | √ | Resistance to guessing attack | √ | × | × | √ | Resistance to replay attack | √ | √ | × | √ | Resistance to the single point of failure | × | × | √ | √ | Resistance to conspiracy attack | × | √ | √ | √ | Mutual dynamic authentication | √ | √ | √ | √ | Consistency of public information | × | × | √ | √ |
|
|