Research Article
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Table 3
Performance analysis of the compared schemes.
| Scheme | Proposed scheme | Zhu and Ma [4] | Lee et al. [5] | Wu et al. [6] | Wu et al. [6] |
| Registration | | | | | | MU |
— | — | — | — | — | HA | 5(h) + 2(⊕) | 2(h) + 3(⊕) | 2(h) + 3(⊕) | 2(h) + 3(⊕) | 2(h) + 1(⊕) | Authentication and key establishment | | | | | | MU | 4(h) + 1(⊕) + 1 Asym | 2(h) + 3(⊕) + 2 Sym | 4(h) + 3(⊕) + 2 Sym | 3(h) + 1(⊕) + 1 Sym | 5(h) + 2(⊕) + 1 Asym | FA | 1(h) + 1 Asym | 2(h) + 1(⊕) + 1 Sym + 2 Asym | 4(h) + 1(⊕) + 2 Sym + 2 Asym | 5(h) + 3 Asym | 4(h) + 2(⊕) + 1 Asym | HA | 6(h) + 3(⊕) | 3(h) + 1 Sym + 3 Asym | 3(h) + 1 Sym + 2 Asym | 2(h) + 2 Sym | 3(h) + 3(⊕) |
| Total | 16(h) + 6(⊕) + 2 Asym | 9(h) + 7(⊕) + 3 Sym + 5 Asym | 13(h) + 7(⊕) + 5 Sym + 4 Asym | 12(h) + 4(⊕) + 3 Sym + 3 Asym | 14(h) + 8(⊕) + 2 Asym |
|
|
(h): number of hash operation, (): number of XOR operation, Sym: number of symmetric key operation, Asym: number of asymmetric key operation.
|