Research Article
An Improved Biometrics-Based Remote User Authentication Scheme with User Anonymity
Table 3
Comparison of computational load in terms of hash functions.
| Phases | Schemes | Li-Hwang’s [19] | Das’s [26] | An’s [27] | Ours |
| Registration phase | 3 h(·) | 3 h(·) | 3 h(·) | 4 h(·) | Login phase | 2 h(·) | 2 h(·) | 3 h(·) | 3 h(·) | Authentication phase | 5 h(·) | 8 h(·) | 6 h(·) | 7 h(·) |
| Total | 10 h(·) | 13 h(·) | 12 h(·) | 14 h(·) |
|
|