| Protocol | Computation | Security Model | Assumption | NAXOS Approch | SPK/EPK |
| Okamoto [9] | 8E | eCK | Standard | Yes | 2/3 |
| HMQV [15] | 2.5E | CK, wPFS, KCI, LEP | KEA1, GDH, RO | No | 1/1 |
| CMQV [16] | 3E | eCK | GDH, RO | Yes | 1/1 |
| NAXOS [4] | 4E | eCK | GDH, RO | Yes | 1/1 |
| NETS [8] | 3E | eCK | GDH, RO | Yes | 1/1 |
| SMEN [17] | 6E | eCK | GDH, RO | No | 2/2 |
| KFU [10] | 3E | eCK | GDH, RO | No | 2/1 |
| Our | 3E | eCK | GDH, RO | No | 2/2 |