Research Article
An Identity-Based Anonymous Three-Party Authenticated Protocol for IoT Infrastructure
Table 7
Storage cost of the proposed and related schemes.
| Schemes | No. of bits required for storage |
| Ours | 672 | He et al. [67] | 672 | Challa et al. [68] | 1024 | Ma et al. [69] | 672 | Taher et al. [70] | 1536 | Chandrakar and Om [71] | 1856 | Lu et al. [72] | 768 | Mo and Chen [73] | 2464 |
|
|