Research Article
Efficient Hierarchical Authentication Protocol for Multiserver Architecture
| | Protocol rounds | Computation cost | Communication cost | Storage cost | Security requirements | User side | Server side | User side | Server side | C1 | C2 | C3 | C4 | C5 | C6 | C7 | C8 | C9 | C10 | C11 | C12 | C13 |
| Odelu et al. [14] | 3 | | | 832 | 672 | 1674 | ✓ | ✓ | ✓ | ✕ | ✕ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✕ | He et al. [15] | 3 | | | 2240 | 1184 | 3424 | ✓ | ✓ | ✓ | ✕ | ✕ | ✕ | ✓ | ✓ | ✕ | ✓ | ✓ | ✓ | ✕ | Ours | 2 | | | 896 | 672 | 1834 | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|