Research Article
A Certificateless Noninteractive Key Exchange Protocol with Provable Security
Table 2
Efficiency comparison of different protocols.
| Protocol | Computation complexity | Running time (in milliseconds) |
| Sang et al.’s [19] | + 2S + 1H | 112.99 | Fu and Liu’s [20] | + S + 2H | 110.04 | Our protocol | + 2S + H | 73.73 |
|
|