Research Article
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment
Table 3
Performance comparison among relevant schemes in wireless sensor networks.
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
denotes the time of modular exponentiation operation, denotes scalar multiplication on elliptic curve, denotes hash computation, denotes symmetric encryption/decryption, (, , , [20]). Let be 32-bit long; Let , , , output of symmetric encryption, timestamp, random numbers be 128-bit long; let , , be 1024-bit long. means the property is satisfied; means the property is not satisfied. Note that the evaluation criteria in [24] are also applied to cloud computing environment when regarding as the sensor node, while the considerations on designing authentication scheme of this two environment are quite different due to their different network attributes. |