Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Table 1
Comparison of computation and communication costs with verifier-based 3PAKA schemes without server public keys.
| | Lee et al.’s scheme [8] | Wang-Mo’s scheme [9] | Kwon et al.’s scheme [10] | Lin-Lee’s scheme [7] | Our scheme | | | | | | | | | | | | | | | |
| Exponentiation | 3 | 4 | 4 | 4 | 4 | 6 | 4 | 4 | 10 | 4 | 4 | 6 | 1 | 1 | 0 | X-or | 1 | 1 | 2 | 1 | 1 | 2 | 0 | 0 | 0 | 1 | 1 | 2 | 0 | 0 | 0 | Multip./division | 0 | 0 | 0 | 0 | 0 | 0 | 3 | 3 | 4 | 0 | 0 | 0 | 0 | 0 | 0 | Random number | 1 | 1 | 2 | 1 | 1 | 2 | 1 | 1 | 4 | 1 | 1 | 2 | 0 | 0 | 0 | Hash | 3 | 3 | 4 | 3 | 3 | 4 | 3 | 3 | 4 | 4 | 4 | 4 | 1 | 0 | 1 | Encryption/decryption | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 4 | 4 | 2 | Transmission messages | 3 | 6 | 4 | 3 | 6 | 4 | 3 | 10 | 3 | 6 | 7 | 4 | 4 | 2 | 3 | Transmission rounds | 2 | 3 | 4 | 2 | 3 | 4 | 2 | 4 | 2 | 4 | 4 | 4 | 2 | 2 | 2 |
|
|