Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Table 3
Comparison of computation and communication costs with RSA-based 3PAKA schemes.
| | Chang et al.’s scheme [11] | Tso’s scheme [12] | Farash and Attari’s scheme [13] | Deebak et al.’s scheme [14] | Our scheme | | | | | | | | | | | | | | | | |
| Exponentiation | 3 | 2 | 3 | 3 | 3 | 4 | 3 | 2 | 2 | 1 | 1 | 2 | 1 | 1 | 0 | X-or | 1 | 1 | 2 | 0 | 0 | 4 | 0 | 0 | 0 | 2 | 2 | 2 | 0 | 0 | 0 | Multip./division | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | Random number | 1 | 1 | 2 | 1 | 1 | 2 | 1 | 1 | 2 | 0 | 0 | 0 | 0 | 0 | 0 | Hash | 4 | 2 | 4 | 4 | 2 | 4 | 4 | 3 | 5 | 6 | 6 | 4 | 0 | 0 | 1 | Encryption/decryption | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 2 | 2 | 2 | Transmission messages | 8 | 5 | 5 | 8 | 5 | 6 | 5 | 3 | 9 | 3 | 6 | 10 | 3 | 1 | 3 | Transmission rounds | 3 | 1 | 2 | 3 | 1 | 2 | 2 | 1 | 3 | 1 | 1 | 2 | 1 | 1 | 2 |
|
|