During the login and verification phase, the total computation cost of the user and the encryption exponent e of this exponential operation is often very limited, .