Research Article
Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment
Table 8
The comparison of computation cost.
| Schemes | phases |
| Li [11] | 15 × tH | 4 × tH |
| Qu [12] | 11 × tH, 5 × tPM, 5 × tPA | 4 × tH + 2 × tPM |
| Amin [13] | 10 × tH, 5 × tPM, 2 × tPA, 1 × tE/D | 5 × tH, 1 × tE/D |
| Jangirala [18] | 21 × tH | 6 × tH |
| Han [19] | 11 × tH, 2 × tE/D, 4 × tT | 4 × tH, 1 × tE/D |
| Ours | 11 × tH, 6 × tT | 4 × tH, 2 × tT |
|
|