Research Article

Authenticated Blind Issuing of Symmetric Keys for Mobile Access Control System without Trusted Parties

Table 7

Symbols used in performance analysis.

SymbolMeaning

Length of , , , , and each command (e.g., 32 bits)
Length of the output of hash function (e.g., 128 bits)
Length of a symmetric key (e.g., 128 bits)
Length of and (e.g., 1024 bits)
Length of and (e.g., + = 1184 bits)

The cost of running MAC algorithm
The cost of running the comparison or element-existence checking
The cost of running the symmetric-key encryption function
The cost of running the symmetric-key decryption function
The cost of running the module exponential computation

Note: normally, , and .