Research Article
Study on Delay Optimization of Fog Computing Edge Nodes Based on the CPSO-LB Algorithm
Table 1
Comparison of identity authentication performance and security.
| Program | Pair operation | Point multiplication | Communication times | Φ1 | Φ2 | Φ3 | Φ4 |
| Literature [16] | 0 | 5 | 2 | √ | √ | √ | × | Literature [17] | 0 | 2 | 4 | √ | √ | √ | × | Literature [18] | 0 | 5 | 3 | √ | √ | √ | × | Literature [19] | 1 | 5 | 2 | √ | √ | × | × | Literature [20] | 0 | 5 | 2 | √ | √ | √ | √ | Literature [21] | 0 | 5 | 2 | √ | √ | √ | √ | This article | 0 | 4 | 2 | √ | √ | √ | √ |
|
|