Research Article
An Efficient Three-Party Authentication Scheme for Data Exchange in Medical Environment
Table 5
Comparison of computation and communication costs with other 3PAKA schemes.
| | Chen et at.’s scheme [15] | Wang et al.’s scheme [16] | Farash et al.’s scheme [17] | Our scheme | | | | | | | | | | | | |
| Exponentiation | 3 | 3 | 2 | 4 | 4 | 6 | 2 | 3 | 2 | 1 | 1 | 0 | X-or | 0 | 0 | 0 | 1 | 1 | 2 | 1 | 2 | 3 | 0 | 0 | 0 | Multip./division | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | Random number | 1 | 1 | 0 | 1 | 1 | 1 | 1 | 1 | 0 | 0 | 0 | 0 | Hash | 2 | 2 | 2 | 3 | 3 | 4 | 1 | 2 | 2 | 0 | 0 | 1 | Encryption/decryption | 0 | 0 | 0 | 2 | 2 | 3 | 0 | 0 | 0 | 2 | 2 | 2 | Transmission messages | 5 | 11 | 2 | 3 | 8 | 1 | 4 | 10 | 5 | 3 | 1 | 3 | Transmission rounds | 2 | 2 | 1 | 2 | 1 | 4 | 1 | 2 | 1 | 1 | 1 | 2 |
|
|