Research Article
A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT
Table 4
Stats on time-consuming cryptographic operations.
| Phase | Computation cost | UE | EA | DM |
| Setup and register | — | — | 2 + + 2 + +2 + 2 | Intradomain authentication | + + 2 + + 2 + | + + 2 + + 2 + 2 | \ | Cross-domain authentication | + + 2 + + 2+ | — | + + 2 + +2 + 2 |
|
|