Research Article

An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity

Table 3

Comparison of computational load in terms of hash functions.

PhasesSchemes
Li-Hwang’s [19]Das’s [26]An’s [27]Ours

Registration phase3 h(·)3 h(·)3 h(·)4 h(·)
Login phase2 h(·)2 h(·)3 h(·)3 h(·)
Authentication phase5 h(·)8 h(·)6 h(·)7 h(·)

Total10 h(·)13 h(·)12 h(·)14 h(·)