Skip to main content
. 2014 Apr 14;2014:825072. doi: 10.1155/2014/825072

Table 1.

Security proof comparison.

Protocol Idealized assumption Adversary capability Resistance to UDOD attacks
Our protocol None Not restricted Proven
GPAKE [21] None Restricted from corrupting parties No [4]
NGPAKE [4] None Not proven
Lin and Hwang [7] Random oracles Not restricted Not proven
Wu et al. [8] Random oracles Not restricted Not proven

Resistance to undetectable online dictionary attacks.