Skip to main content

Table 3 Operations comparison among our scheme with other related schemes

From: An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

 

Ours

Kang et al. [10]

Amin et al. [5]

Cloud server registration phase

2H

2H

2H

User registration phase

4H + 3X

5H + 3X

5H + 3X

Login phase

5H + 5X

5H + 6X

6H + 5X

Authertication and key agreement phase

17H + 20X

18H + 21X

17H + 20X

Total count

28H + 28X

30H + 30X

30H + 28X

  1. H, hash operation and it’s numbers; X, xor operation and it’s numbers