Research Article

Two-Factor User Authentication with Key Agreement Scheme Based on Elliptic Curve Cryptosystem

Table 1

Computation cost comparison among our scheme and others.

ā€‰ Yang and Chang [15] Islam and Biswas [16]Our scheme

Registration phase
Authentication phase
Total computation cost

: the time complexity of ECC multiplication operation; : the time complexity of ECC addition/subtraction operation; : the time complexity of hashing function operation.