“…In this section, we will compare the literature Refs. [24,25,7] and this protocol from two aspects: computational consumption and communication consumption. These three protocols are representative documents in the field of cross-domain identity authentication.…”