Research Article

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials

Table 8

Computation overhead comparison.

C1C2C3C4

Fan et al. [22]4Th+ 1Tsq ≈ 0.0175 ms3Th+ 1Ts + 1Tcrt ≈ 0.0238 ms##
Juang et al. [23]3Th+ 3Ts ≈ 0.021 ms4Th+ 6Ts + 1Tm ≈ 0.186 ms14Th+ 5Ts ≈ 0.1015 ms52Th+ 5Ts ≈ 0.2345 ms
Sun et al. [24]4Th+ 2Tm ≈ 0.232 ms4Th+ 1Ts + 1Tm ≈ 0.1335 ms2Th ≈ 0.007 ms0
Li et al. [25]8Th+ 4Ts ≈ 0.0385 ms10Th+ 10Ts + 1Tm ≈ 0.249 ms21Th+ 6Ts ≈ 0.1365 ms70Th+ 9Ts ≈ 0.3395 ms
Maitra [27]8Th+ 6te+ 1tm ≈ 157.069 ms8Th+ 4te+ 1tm+ 1tinv ≈ 150.029 ms6Th ≈ 0.042 ms0
Chaudhry et al. [28]1Tp+ 6Th+ 3Tm+ 2Ta+ 2Te+ 2tm+ 1tinv ≈ 183.7542 ms3Tp+ 5Th+ 4Tm+ 3Ta+ 2Te+ 1tm ≈ 462.9762 ms##
Guo et al. [19]2Th+ 2Ts + 3Tc ≈ 0.3925 ms2Th+ 2Ts + 3Tc ≈ 0.3925 ms2Th+ 1Ts + 2Tc ≈ 0.2542 ms3Ts + 1Tc ≈ 0.153 ms
Lin [20]3Th+ 2Ts + 2Tc ≈ 0.2745 ms2Th+ 3Ts + 3Tc ≈ 0.403 ms2Th+ 1Ts + 1Tc ≈ 0.1327 ms3Ts + 1Tc ≈ 0.153 ms
Lee [21]3Th+ 1Ts + 3Tc ≈ 0.3945 ms2Th+ 2Ts + 3Tc ≈ 0.3925 ms4Th+ 1Ts + 2Tc ≈ 0.2675 ms2Th+ 3Ts + 1Tc ≈ 0.16 ms
Irshad et al. [29]7Th+ 4Tc ≈ 0.5105 ms4Th+ 3Tc ≈ 0.3785 ms6Th ≈ 0.042 ms0
Irshad et al. [30]11Th+ 3Tc ≈ 0.4030 ms7Th+ 2Tc ≈ 0.2675 ms8Th ≈ 0.056 ms0
Our protocols9Th+ 1Tsq + 1Tc ≈ 0.1565 ms7Th+ 1Tcrt+ 1Ts + 1Tc ≈ 0.1593 ms2Th ≈ 0.014 ms0

C1 denotes the computational cost of a user in the authenticated key exchange phase. C2 refers to the computational cost of the server in the authenticated key exchange phase. C3/C4 represents the computational cost of the user/server during the password change phase. N/A represents no requirement of computation. # denotes that the scheme does not provide the functionality of password updating.