Research Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Table 8
The comparison of computation cost.
| | Schemes | phases |
| | Li [11] | 15 × tH | | 4 × tH |
| | Qu [12] | 11 × tH, 5 × tPM, 5 × tPA | | 4 × tH + 2 × tPM |
| | Amin [13] | 10 × tH, 5 × tPM, 2 × tPA, 1 × tE/D | | 5 × tH, 1 × tE/D |
| | Jangirala [18] | 21 × tH | | 6 × tH |
| | Han [19] | 11 × tH, 2 × tE/D, 4 × tT | | 4 × tH, 1 × tE/D |
| | Ours | 11 × tH, 6 × tT | | 4 × tH, 2 × tT |
|
|