Research Article
Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
Table 5
Comparison of the communication efficiency.
| ||||||||||||||||||||||||||
Note.: point addition in elliptic curve group; : exponentiation operation in cyclic group; : hash function; : bilinear map; : exponentiation operation over bilinear pairing; : modular addition in cyclic group; : encryption/decryption operation. |