Research Article
An Efficient Integrity Verification and Authentication Scheme over the Remote Data in the Public Clouds for Mobile Users
Table 4
Comparison of computational cost.
| Sl. no. | Protocol | Tag generation (ms) | Proof generation (ms) | Proof verification (ms) |
| 1. | Yu et al. [15] | | | | 2. | Wang et al. [20] | | | | 3. | Zhu et al. [22] | | | | 4. | Yang et al. [23] | | | | 5. | Proposed protocol | | | |
|
|