Research Article
Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties
Table 7
Symbols used in performance analysis.
| Symbol | Meaning |
| | Length of , , , , and each command (e.g., 32 bits) | | Length of the output of hash function (e.g., 128 bits) | | Length of a symmetric key (e.g., 128 bits) | | Length of and (e.g., 1024 bits) | | Length of and (e.g., + = 1184 bits) |
| | The cost of running MAC algorithm | | The cost of running the comparison or element-existence checking | | The cost of running the symmetric-key encryption function | | The cost of running the symmetric-key decryption function | | The cost of running the module exponential computation |
|
|
Note: normally, , and .
|