Skip to main content

Advances, Systems and Applications

Table 3 Computation cost comparison

From: AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments

Computation Party

[23]

[24]

[25]

[28]

The proposed AMAKAS scheme

User

4\({T}_{h}\)+2\({T}_{P}\)+2\({T}_{m}\)

11\({T}_{h}\)+2\({T}_{P}\)

10\({T}_{h}\)+2\({T}_{P}\)+\(1{T}_{AED}\)

8\({T}_{h}\)+\(2{T}_{P}\)+\({3T}_{m}\)+\({1T}_{F}\)

\(10{T}_{h}+2{T}_{P}\)

(ms)

4.5188

4.4773

8.325

6.7828

4.475

Server

6\({T}_{h}\)+2\({T}_{P}\)+3\({T}_{m}\)

6\({T}_{h}\)+\({1T}_{inv}\)

4\({T}_{h}\)+1\({T}_{P}\)

5\({T}_{h}\)+3\({T}_{P}\)+\(4{T}_{m}\)

5\({T}_{h}\)+2\({T}_{P}\)

(ms)

4.5522

≈ 190.189E + 06

2.2352

6.8116

4.4635

Total

10\({T}_{h}\)+4\({T}_{P}\)+5\({T}_{m}\)

17\({T}_{h}\)+2\({T}_{P}\)+\(1{T}_{inv}\)

14\({T}_{h}\)+3\({T}_{P}\)+\(1{T}_{AED}\)

13\({T}_{h}\)+5\({T}_{P}\)+7\({T}_{m}\)+\(1{T}_{F}\)

\(15{T}_{h}+4{T}_{P}\)

(ms)

9.071

190.189E + 06

10.5602

13.5944

8.9385