Research Article
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability
Table 4
Communication comparison of our scheme with recent schemes in terms of bits.
| scheme | Client to server | Server to client | Total |
| Zhao et al. [20] scheme | | | 2408 | Zheng et al. [22] scheme | | | 1248 | Zhang et al. [21] scheme | | | 2560 | Chan et al.’s [1] scheme | | | 768 | Liu et al.’s scheme [2] | | | 1792 | Liu et al.’s P-quantum secure scheme [23] | | | 27528 | Our proposed scheme | | | 2720 | Our P-quantum secure scheme | | | 1792 |
|
|