Research Article

Provably Secure ECC-Based Three-Factor Authentication Scheme for Mobile Cloud Computing with Offline Registration Centre

Table 4

Executing time of some cryptography operations.

Cryptography operationsSymbolsRunning time (ms)
UserServer

Map-to-point hash function33.5825.493
Bilinear paring32.7135.427
Elliptic curve point multiplication13.4052.165
Elliptic curve point addition0.0810.013
Exponentiation operation2.2490.339
Hash function0.0560.007