Research Article
Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment
Table 3
The efficiency comparison among the schemes.
| | The phases | Lin[23] | Zhu[24] | Ours |
| | Registration | 1×h+1×T+1×e/d | 5×h | 4×h+2×T | | Authentication | 4×h+5×T+5×e/d | 9×h+3×T+2×e/d | 14×h+8×T |
|
|