Research Article
Two-Round Password-Based Authenticated Key Exchange from Lattices
Table 4
Performance comparisons of PAKE protocols.
| Protocol | Type | M-Auth | Anti-Qu | Round | C-method | C-cost |
| Z-2PAKE [1] | 2-party | √ | √ | 2 | V-mul | (2m+2n1)lbq+n | K-2PAKE [33] | 2-party | ╳ | √ | 3 | V-mul | (mn+2n)lbq+3n | D-2PAKE [34] | 2-party | √ | √ | 3 | V-mul | (mn/2+m/2+3n)lbq+2n | 2PAKE | 2-party | √ | √ | 2 | V-mul | (2m+3n1)lbq+n | A-3PAKE [30] | 3-party | ╳ | ╳ | 4 | Exp | — | Y-3PAKE [35] | 3-party | √ | √ | 3 | V-mul | 2[(mn+n)lbq+3n] | X-3PAKE [36] | 3-party | √ | √ | 3 | V-mul | 7nlbq+9n+5 | 3PAKE | 3-party | √ | √ | 2 | V-mul | 2[(2m+3n1)lbq+2n] |
|
|