Research Article

A2 Chain: A Blockchain-Based Decentralized Authentication Scheme for 5G-Enabled IoT

Table 7

Comparison of time cost cryptographic operations in authentication.

SchemeUserServer

A2 Chain +  + 2 +  + 2  + 2 +  +2 + +2+2
ES3A [25]6 + 3 + 3 + 3 + 8 + 4
CPAL [27]16 + 710 + 7
LCCH [54]301 + 8 + 823 + 6 + 5
E-AUA [55]2 +3 + 2 + 2 + 

1 indicates the exponentiation in , and the meanings of other symbols are similar to the above definition.