Security and Communication Networks / 2021 / Article / Tab 8 / Research Article
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials Table 8 Computation overhead comparison.
C 1 C 2 C 3 C 4 Fan et al. [22 ] 4T h + 1T sq ≈ 0.0175 ms 3T h + 1T s + 1T crt ≈ 0.0238 ms # # Juang et al. [23 ] 3T h + 3T s ≈ 0.021 ms 4T h + 6T s + 1T m ≈ 0.186 ms 14T h + 5T s ≈ 0.1015 ms 52T h + 5T s ≈ 0.2345 ms Sun et al. [24 ] 4T h + 2T m ≈ 0.232 ms 4T h + 1T s + 1T m ≈ 0.1335 ms 2T h ≈ 0.007 ms 0 Li et al. [25 ] 8T h + 4T s ≈ 0.0385 ms 10T h + 10T s + 1T m ≈ 0.249 ms 21T h + 6T s ≈ 0.1365 ms 70T h + 9T s ≈ 0.3395 ms Maitra [27 ] 8T h + 6te + 1t m ≈ 157.069 ms 8T h + 4t e + 1t m + 1t inv ≈ 150.029 ms 6T h ≈ 0.042 ms 0 Chaudhry et al. [28 ] 1T p + 6T h + 3T m + 2T a + 2T e + 2t m + 1t inv ≈ 183.7542 ms 3T p + 5T h + 4T m + 3T a + 2T e + 1t m ≈ 462.9762 ms # # Guo et al. [19 ] 2T h + 2T s + 3T c ≈ 0.3925 ms 2T h + 2T s + 3T c ≈ 0.3925 ms 2T h + 1T s + 2T c ≈ 0.2542 ms 3T s + 1T c ≈ 0.153 ms Lin [20 ] 3T h + 2T s + 2T c ≈ 0.2745 ms 2T h + 3T s + 3T c ≈ 0.403 ms 2T h + 1T s + 1T c ≈ 0.1327 ms 3T s + 1T c ≈ 0.153 ms Lee [21 ] 3T h + 1T s + 3T c ≈ 0.3945 ms 2T h + 2T s + 3T c ≈ 0.3925 ms 4T h + 1T s + 2T c ≈ 0.2675 ms 2T h + 3T s + 1T c ≈ 0.16 ms Irshad et al. [29 ] 7T h + 4T c ≈ 0.5105 ms 4T h + 3T c ≈ 0.3785 ms 6T h ≈ 0.042 ms 0 Irshad et al. [30 ] 11T h + 3T c ≈ 0.4030 ms 7T h + 2T c ≈ 0.2675 ms 8T h ≈ 0.056 ms 0 Our protocols 9T h + 1T sq + 1T c ≈ 0.1565 ms 7T h + 1T crt + 1T s + 1T c ≈ 0.1593 ms 2T h ≈ 0.014 ms 0
C 1 denotes the computational cost of a user in the authenticated key exchange phase. C 2 refers to the computational cost of the server in the authenticated key exchange phase. C 3 /C 4 represents the computational cost of the user/server during the password change phase. N/A represents no requirement of computation. # denotes that the scheme does not provide the functionality of password updating.