Research Article
Improved Verifier-Based Three-Party Password-Authenticated Key Exchange Protocol from Ideal Lattices
Table 2
Computation and communication cost of the proposed protocol.
| Stage | n = 32 | n = 64 | n = 128 | n = 256 | n = 512 |
| First computation cost of user A | 1.96 ms | 3.97 ms | 9.61 ms | 22.82 ms | 78.91 ms | Server’s computation cost | 20.52 ms | 63.10 ms | 353.49 ms | 3373.06 ms | 45802.87 ms | User B’s computation cost | 0.38 ms | 0.63 ms | 1.07 ms | 3.39 ms | 4.62 ms | Second computation cost of user A | 0.31 ms | 0.47 ms | 0.77 ms | 1.49 ms | 3.20 ms | Total communication cost | 7 KB | 13 KB | 24 KB | 48 KB | 79 KB |
|
|