Research Article
A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity
Table 7
Running time of single operation.
| Notation | Definition | |
| | Execution time for one-way hash function | 0.004 | | Execution time for NTRU encryption | 0.13 | | Execution time for NTRU decryption | 0.086 | | Execution time for NTRU modulus multiplication | 0.0138 | | Execution time for symmetrical encryption/decryption | 0.075 | | Execution time for ECC-based encryption/decryption | 3.85 | | Execution time for modular exponent operation | 3.85 | | Execution time for elliptic curve point multiplication | 2.226 | | Execution time for elliptic curve point addition | 0.025 | | Execution time for Chebyshev polynomial computation | 2.226 |
|
|
Configuration of experiment CPU: i7-6700, 4 core 8 threads, 3.4GHZ, OS: Windows10, Software: IntelliJ IDEA2019 library: libntru https://github.com/tbuktu/ntru |