Skip to main content

Table 3 Communication and storage costs of different algorithms

From: RETRACTED ARTICLE: Efficient identity security authentication method based on improved R-LWE algorithm in IoT environment

Algorithm

Communication costs

Storage costs

IoT devices

Server

IoT devices

Server

IR-LWE

2C

2C

2C

3C

NTRU

4C

3C

4C

4C

ECC

4C

4C

4C

5C