Fig. 4From: A secure cross-domain authentication scheme based on threshold signature for MECComparison of the credential generation timeBack to article page