Research Article

Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices

Table 2

Computation and communication cost of the proposed protocol.

Stagen = 32n = 64n = 128n = 256n = 512

First computation cost of user A1.96 ms3.97 ms9.61 ms22.82 ms78.91 ms
Server’s computation cost20.52 ms63.10 ms353.49 ms3373.06 ms45802.87 ms
User B’s computation cost0.38 ms0.63 ms1.07 ms3.39 ms4.62 ms
Second computation cost of user A0.31 ms0.47 ms0.77 ms1.49 ms3.20 ms
Total communication cost7 KB13 KB24 KB48 KB79 KB