Research Article
Efficient and Secure Biometric-Based User Authenticated Key Agreement Scheme with Anonymity
| Phases/Schemes | An | Chou et al. | Chang et al. | Kumari et al. | Kaul & Awasthi | Proposed | ā | [9] | [10] | [12] | [13] | [14] | scheme |
| Registration phase | 3+2 | 7+5 | 2+1 | 4+5 | 6+3 | 6+3 | Login phase | 2+4 | 5+3 | 4+3 | 5+10 | 8+12 | 6+3 | Authentication phase | 7+8+4 | 17+16 | 6+2 | 7+3 | 6+9 | 8+6 | PW change phase | ā | 7+6 | 12+8 | 5+6 | 8+12 | 7+3 | Total cost | 12+14+4 | 36+31 | 24+14 | 21+24 | 28+36 | 27+15 | Execution time | 2.094 s | 0.018 s | 0.012 s | 0.0105 s | 0.014 s | 0.0135 s | Memory capacity | 640 bits | 896 bits | 384 bits | 768 bits | 640 bits | 512 bits | Exchange cost | 896 bits | 1080 bits | 768 bits | 896 bits | 768 bits | 768 bits |
|
|