Research Article
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
Table 8
Computational cost of the client and server.
| | MU | FA | HA | Times (ms) |
| Wu et al. [18] | 8 | | 8 | 8.08 | Grope and Hwang [17] | | | | 7.748 | Wen et al. [13] | | | | 11.602 | Jiang et al. [12] | | | | 7.748 | Farash et al. [16] | | | | 0.348 | Alzahrani et al. [31] | 9 + 5 + 2 | 6 + 4 + 2 | 8 + 5 + 3 | 31.431 | Lu et al. [34] | 10 + 5 + 3 + 2 | 6 + 4 + 2 | 9 + 6 + 5 + | 33.965 | Lee et al. [20] | 7 | 4 | 9 + 2 | 0.23 | Ostad-Sharif et al. [33] | 9 + 2 | + 2 | 9 | 8.988 | Khatoon et al. [32] | 9 + 3 | 5 + 2 | 6 + | 13.436 | Ours | | | + | 0.7276 |
|
|