Research Article

An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure

Table 7

Storage cost of the proposed and related schemes.

SchemesNo. of bits required for storage

Ours672
He et al. [67]672
Challa et al. [68]1024
Ma et al. [69]672
Taher et al. [70]1536
Chandrakar and Om [71]1856
Lu et al. [72]768
Mo and Chen [73]2464