“…To evaluate execution time of our scheme with other existing schemes, the hash function, bio-hash function, symmetric key encryption or decryption operation, modular exponentiation operation, elliptic curve point multiplication, and bilinear operation take 0.0005, 0.02102, 0.0087, 0.522, 0.0503, and 0.0621 seconds, respectively. 59,60 As in the work of He et al, 68 the execution time for a fuzzy extractor function is near about equal to an elliptic curve point multiplication. The estimated computational time of the protocols of Amin and Biswas, 30 Irshad et al, 51 Li et al, 18 Maitra et al, 19 Li et al, 52 Lin et al, 53 Maitra and Giri, 54 Pippal et al, 16 Wen et al, 55 Yoon and Yoo, 56 and Amin and Biswas, 44 and our proposed protocol are 0.05404, 0.7684, 2.098, 0.0652, 0.4164, 0.2609, 0.0438, 3.658, 0.095, 0.2112, 0.98304, and 0.8701 seconds, respectively.…”