Table 3.
Scheme | Computation | Security | ||
---|---|---|---|---|
|
|
|||
SR | UR+SR+GW | AKE | Anonymity | |
Our scheme | 2M +2A+1H | 6M +3E +6A+6H | Proven | Proven |
| ||||
Choi et al. [27] | 2M +5H | 6M +18H | Proven using a computer security approach | No |
| ||||
Shi and Gong [21] | 2M +4H | 6M +15H | Broken [27] | No |
| ||||
Yeh et al. [16] | 2M +1P + 2H | 8M +2P +9H | Broken [30] | No |
M: scalar-point multiplication; P: map-to-point operation; E: symmetric encryption/decryption; A: MAC generation/verification; H: hash function evaluation.