Research Article
A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture
Table 9
Communication overhead comparison.
| | Our scheme | Kou et al.’s scheme [2] | Ying and Nayak’s scheme [36] | Xiong et al.’s scheme [11] | He and Wang’s scheme [4] | Odelu et al.’s scheme [5] |
| Rounds of message exchange | 3 | 2 | 2 | 2 | 5 | 5 | Number of bits required | 1984 | 1568 | 1632 | 1568 | 3520 | 2944 |
|
|