Protocol

Security relies on

Method of Authentication

Design Principle

W. Hsiang An et al.’s Protocol

Hash Function

Hybrid Key

ECC

C. Popescu’s Protocol

ECDLP

Public/Private Key pairs

Diffie-Hellman

L. Harn et al.’s Protocol

IFP

Public/Private Key pairs

Diffie-Hellman

Tseng’s et al.’s Protocol

DLP

Public/Private Key pairs

Diffie-Hellman

Y. Eun-Jun et al.’s Protocol

ECDLP

Password Based

ECC

M. Nabil et al.’s Protocol

ECDLP

Hybrid Key

ECC