Skip to main content
. 2021 Aug 30;21(17):5824. doi: 10.3390/s21175824

Table 4.

Operations requirement of each proposed protocol.

Requirement Liao Zhao Alamr Naeem Dinarvand Benssalah Zheng Yang Aloui Izza
T R T R T R T R T R T R T R T R T R T R
Random number 1 1 1 1 1 2 1 2 1 1 1 1 1 1 0 0 1 1 1 1
Scalar multiplication 5 5 5 5 4 5 5 5 3 3 3 1 4 4 1 1 2 2 2 4
Point addition 2 2 2 2 1 1 1 1 0 0 1 1 3 3 0 0 0 0 0 0
XOR operation 0 0 0 0 0 0 0 0 2 2 0 0 0 0 0 0 2 2 1 1
Hash function 0 0 0 0 0 0 2 2 0 0 3 3 0 0 4 4 2 1 6 7

T: tag, R: reader.