Research Article

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network

Table 2

Comparison of time-consuming cryptographic primitives in Au and KA.

SchemeUserAuth-side

FUIS
[16]
[46]
[47]

, , and represents scalar multiplication, represents multiscalar multiplication elliptic curve, is set in experiment, represent modular exponentiation under cyclic groups , and BP represents bilinear mapping.