Research Article
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment
Table 5
Performance comparison among relevant schemes in multiserver.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
is the time of modular exponentiation operation, is the time of scalar multiplication on elliptic curve, is the time of hash computation, and is the time of symmetric encryption/decryption; and the lightweight operation such as “XOR” and “” can be ignored [2]. Let be 32-bit long; let , , , output of symmetric encryption, timestamp, and random numbers be 128-bit long; let , , be 1024-bit long [2]. means the property is satisfied; means the property is not satisfied; means the property is not related to the scheme. |