Research Article

A Certificateless Noninteractive Key Exchange Protocol with Provable Security

Table 2

Efficiency comparison of different protocols.

ProtocolComputation complexityRunning time (in milliseconds)

Sang et al.’s [19] + 2S + 1H112.99
Fu and Liu’s [20] + S + 2H110.04
Our protocol + 2S + H73.73