Security attack | Chiou et al. [13] | Mohit et al. [14] | Kumar et al. [15] | Li et al. [16] | The proposed scheme |
---|---|---|---|---|---|
Patient anonymity | No | No | Yes | No | Yes |
Patient unlinkability | No | No | Yes | No | Yes |
Doctor unlinkability | No | No | No | No | Yes |
Mutual authentication | Yes | Yes | Yes | Yes | Yes |
Data integrity | Yes | Yes | Yes | Yes | Yes |
Data non-repudiation | Yes | Yes | Yes | Yes | Yes |
Confidentiality | Yes | Yes | Yes | Yes | Yes |
Availability | Yes | Yes | Yes | Yes | Yes |
Replay attack | Yes | Yes | Yes | Yes | Yes |
Man-in-the-middle attack | Yes | Yes | Yes | Yes | Yes |
Impersonation attack | No | No | Yes | No | Yes |