Research Article

A Lightweight Three-Party Mutual Authentication Protocol for Internet of Health Things Systems

Table 3

Time requirement of the calculation method.

SignsDescriptionTimes (

Hash function
Symmetric encryption/decryption
Message authentication code
EC point addition
Chinese remainder theorem (CRT)
Modular exponentiation
EC scalar multiplication
Signature generation using ECDSA
Signature verification using ECDSA
Map-to-point on ECC
ECC bilinear pairing
Fuzzy extractor functionā€”
Time required for XOR operationNegligible