Table 1.
Protocol | Idealized assumption | Adversary capability | Resistance to UDOD attacks† |
---|---|---|---|
Our protocol | None | Not restricted | Proven |
GPAKE [21] | None | Restricted from corrupting parties | No [4] |
NGPAKE [4] | None | Not proven | |
Lin and Hwang [7] | Random oracles | Not restricted | Not proven |
Wu et al. [8] | Random oracles | Not restricted | Not proven |
†Resistance to undetectable online dictionary attacks.