Research Article
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems
Table 3
The cryptographic operation time in the SEAPA scheme (microseconds).
| | | | Poly addition | Poly subtraction | Poly multiplication | Poly Gaussian | Hash function |
| 8 | 60 | 16 | 0.00456 | 0.00250 | 0.00333 | 0.00243 | 0.105 | 128 | 14 | 216 | 0.00335 | 0.00230 | 0.00243 | 0.00262 | 0.1100 | 1024 | 60 | 2048 | 0.00248 | 0.00369 | 0.00227 | 0.00256 | 0.175 | 8192 | 124 | 16384 | 0.00454 | 0.00475 | 0.00652 | 0.00474 | 0.177 | 32768 | 124 | 65536 | 0.0120 | 0.0120 | 0.02678 | 0.0375 | 0.287 |
|
|