Research Article

Multifactor Authentication for Smart Emergency Medical Response Transporters

Table 2

The computational time of crypto-operations [51, 52].

OperationDescriptionTime (ms)

Scalar multiplication32.3
Asymmetric encryption/decryption311.8
Execute/verify a signature322.3
Symmetric encryption/decryption7.2
Bilinear pairing31.3
One-way hash function0.33