Research Article

Improved ECC-Based Three-Factor Multiserver Authentication Scheme

Table 4

Computation cost comparison.

SchemeUser computationsServer computationsTotal

Ali et al.’s scheme [34]
Wang et al.’s scheme [36]
Our scheme

, time for executing elliptic curve scalar point multiplication. , time for performing elliptic curve point addition operation. , time for executing symmetric encryption/decryption operation.