Table 2.
Requirements | Bayat et al. [36] | Lei Zhang et al. [37] | Bayat et al. [38] | Pournaghi et al. [39] | Bayat et al. [41] | SE-CPPA |
---|---|---|---|---|---|---|
Message Integrity and Authentication | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Identity Privacy-Preserving | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Unlinkability | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ |
Traceability and Revocation | ✗ | ✗ | ✓ | ✓ | ✓ | ✓ |
Resistance to Modification Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Resistance to Replay Attacks | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ |
Resistance to Man-in-the-Middle Attacks | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Resistance to Impersonation Attacks | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |