Skip to main content

Table 2 Comparisons of computation complexity in the authentication phase

From: An efficient and secure anonymous authentication scheme for mobile satellite communication systems

 

Cruickshank

Hwang et al.

Chang et al.

Chen et al.

Proposed

Hash operations

-

-

*N-(j-1)+3/3

1/3

1/4

MAC operations

-

-

-

1/1

2/2

Symmetric operations

1/1

2/2

-

1/1

-

Asymmetric operations

1/1

-

-

(0/3)

-

Equation solving operations

-

-

-

k

-

  1. *j th authentication request
  2. k means computation time to solve k from s = h(U ID )x + kr-1 mod q
  3. () means off-line or another authentication server's operations