This dataset comprises the time cost of ten cryptographic operations on our testing platform, as well as the required number of operations and corresponding time consumption at each phase of the authentication schemes from six selected literature sources. The data is utilized for comparative analysis and evaluation of the operational efficiency among various identity authentication schemes.