Datasets
Standard Dataset
Time cost test results for authentication schemes

- Citation Author(s):
- Submitted by:
- Wang Zixun
- Last updated:
- Sat, 04/26/2025 - 08:38
- DOI:
- 10.21227/yyt2-8v66
- Data Format:
- License:
- Categories:
- Keywords:
Abstract
This dataset comprises the time cost of ten cryptographic operations on our testing platform, as well as the required number of operations and corresponding time consumption at each phase of the authentication schemes from six selected literature sources. The data is utilized for comparative analysis and evaluation of the operational efficiency among various identity authentication schemes.
The first sheet presents a statistical table of the operations required by each scheme. Cells B2:L2 provide the time consumption of individual operations, while cells M3:M22 display the total time consumption for each scheme. Sheet 2 estimates the total time consumption for completing one authentication and performing n signatures for each scheme, based on the data from Sheet 1