Protocol | Computation | Security Model | Assumption | NAXOS Approch | SPK/EPK |
Okamoto [9] | 8E | eCK | Standard | Yes | 2/3 |
HMQV [15] | 2.5E | CK, wPFS, KCI, LEP | KEA1, GDH, RO | No | 1/1 |
CMQV [16] | 3E | eCK | GDH, RO | Yes | 1/1 |
NAXOS [4] | 4E | eCK | GDH, RO | Yes | 1/1 |
NETS [8] | 3E | eCK | GDH, RO | Yes | 1/1 |
SMEN [17] | 6E | eCK | GDH, RO | No | 2/2 |
KFU [10] | 3E | eCK | GDH, RO | No | 2/1 |
Our | 3E | eCK | GDH, RO | No | 2/2 |