Research Article
Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre
Table 4
Executing time of some cryptography operations.
| Cryptography operations | Symbols | Running time (ms) | User | Server |
| Map-to-point hash function | | 33.582 | 5.493 | Bilinear paring | | 32.713 | 5.427 | Elliptic curve point multiplication | | 13.405 | 2.165 | Elliptic curve point addition | | 0.081 | 0.013 | Exponentiation operation | | 2.249 | 0.339 | Hash function | | 0.056 | 0.007 |
|
|