Research Article

Analysis and Enhancement of a Password Authentication and Update Scheme Based on Elliptic Curve Cryptography

Table 3

Comparisons of computation cost.

Proposal Participant Computation cost

[10]User
Server

[13]User
Server

OursUser
Server

: point-multiplication operation on elliptic curve.
: point-multiplication operation on finite field.
: symmetric encryption operation.
: symmetric decryption operation.
: hash operation.
: addition operation on elliptic curve.
: bilinear paring operation on elliptic curve.