Research Article
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Table 3
Protocol comparison.
| Protocol | Cost | Both implicit and explicit key confirmation? |
| Cao et al. (2008) [13] | | No | Cao et al. (2010) [10] | | No | He et al. (2012) [2] | 6m + 5a + 2e + 2h | No | Yang and Tan (2011) [24] | | No | He et al. (2011) [14] | | No | Chen and Han (2013) [25] | | No | SM2 [15] | | Yes | Our simplified SM2 protocol | | Yes |
|
|