Research Article

Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment

Table 8

The comparison of computation cost.

Schemes phases

Li [11]15 × tH
4 × tH

Qu [12]11 × tH, 5 × tPM, 5 × tPA
4 × tH + 2 × tPM

Amin [13]10 × tH, 5 × tPM, 2 × tPA, 1 × tE/D
5 × tH, 1 × tE/D

Jangirala [18]21 × tH
6 × tH

Han [19]11 × tH, 2 × tE/D, 4 × tT
4 × tH, 1 × tE/D

Ours11 × tH, 6 × tT
4 × tH, 2 × tT