Skip to main content
. 2023 Jun 12;23(12):5518. doi: 10.3390/s23125518

Table 6.

Informal security proof table. 1: provides, 0: Does not provide.

Schemes R1 R2 R3 R4 R5 R6 R7 R8 R9
Chien Protocol [10]. 0 1 1 0 1 0 0 0 0
Gossamer Protocol [11]. 1 0 0 1 1 0 0 0 0
Xie Protocol [13]. 0 1 1 1 0 1 0 0 0
Sarah Protocol [12]. 0 1 1 1 1 1 0 0 0
Fan Protocol [14]. 0 1 1 0 1 0 0 0 0
Proposed Scheme 1 1 1 1 1 1 1 1 1