Skip to main content
. 2015 Aug 11;10(8):e0131368. doi: 10.1371/journal.pone.0131368

Table 4. Computation cost comparison of the proposed user authentication scheme with others.

Attributes Wen [3] Zhu [34] Wu et al. [57] Cheng et al. [58] Lee [59] Proposed
A 1 2t h + t m 2t h + t m 2t h + t m t h 2t h 2t h
A 2 9t h + t q 5t h + t q 6t h + t m + 2t q 12t h + t m + t q 8t h + t m + 2t q 5t h + t m + t q
A 3 4t h 4t h + t m NA NA NA 4t h
A 4 NA NA NA NA NA 3t h
A 5 2 3 2 2 2 2

A 1: Computation cost in registration phase, A 2: Computation cost in login phase and authentication phase, A 3: Computation cost in password change phase, A 4: Computation cost in smartcard revocation phase, A 5: Number of message communications, NA: Not applicable (this pase is not proposed by the author (s)).