Research Article

A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

Table 5

Computation and communication costs and smart card storage cost of related schemes.

ā€‰Computation overheadRunning time (ms)Communication cost (bits)Storage cost (bits)
UserServerCS

Zhou et al. [26]183584640
Amin et al. [21]11.52560512
Kumari et al. [20]554.642624576
Mo et al. [25]āˆ’385.998960712
Ghani et al. [35]21.41792384
Martinez-Pelaez et al. [36]89.13456640
Our scheme159.12304532