Research Article

A RFID Authentication Protocol for Epidemic Prevention and Epidemic Emergency Management Systems

Table 5

Comparisons of computation cost.

Computation cost[15][29][30][10][28][1]Ours

CCtag5Th2Th4Th3Th2Th2Th2Th
CCRi2Th2Th2Th2Th3Th2Th1Th
CCS7Th3Th6Th5Th5Th4Th + 2Tse3Th + 2Tse
CCTotal14Th7Th12Th10Th10Th8Th + 2Tse6Th + 2Tse

CC: computation cost; Th: CC of single hash function; Tse: CC of symmetric encryption/decryption.