Research Article
Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy
Table 3
Comparison of the proposed scheme with other schemes.
| | Security features | Yao et al. [24] | Masud et al. [25] | Bao and You [26] | Proposed |
| | Resistance to brute force attack | √ | √ | √ | √ | | Resistance to guessing attack | √ | × | × | √ | | Resistance to replay attack | √ | √ | × | √ | | Resistance to the single point of failure | × | × | √ | √ | | Resistance to conspiracy attack | × | √ | √ | √ | | Mutual dynamic authentication | √ | √ | √ | √ | | Consistency of public information | × | × | √ | √ |
|
|