Time cost test results for authentication schemes

Citation Author(s):
Zixun
Wang
Submitted by:
Wang Zixun
Last updated:
Sat, 04/26/2025 - 08:38
DOI:
10.21227/yyt2-8v66
Data Format:
License:
1 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

This dataset comprises the time cost of ten cryptographic operations on our testing platform, as well as the required number of operations and corresponding time consumption at each phase of the authentication schemes from six selected literature sources. The data is utilized for comparative analysis and evaluation of the operational efficiency among various identity authentication schemes.

Instructions: 

The first sheet presents a statistical table of the operations required by each scheme. Cells B2:L2 provide the time consumption of individual operations, while cells M3:M22 display the total time consumption for each scheme. Sheet 2 estimates the total time consumption for completing one authentication and performing n signatures for each scheme, based on the data from Sheet 1

Dataset Files

LOGIN TO ACCESS DATASET FILES