Security properties | [43] | [45] | [47] | [48] | [49] | Ours |
---|---|---|---|---|---|---|
Privileged insider attacks | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) |
TVD attacks | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) |
User impersonation attacks | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
OPG attacks | \(\checkmark\) | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Replay attacks | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
PFS | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Mutual authentication | \(\times\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Anonymity | \(\checkmark\) | \(\times\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |
Untraceability | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) | \(\checkmark\) |