Research Article

Two-Round Password-Based Authenticated Key Exchange from Lattices

Table 4

Performance comparisons of PAKE protocols.

ProtocolTypeM-AuthAnti-QuRoundC-methodC-cost

Z-2PAKE [1]2-party2V-mul(2m+2n1)lbq+n
K-2PAKE [33]2-party3V-mul(mn+2n)lbq+3n
D-2PAKE [34]2-party3V-mul(mn/2+m/2+3n)lbq+2n
2PAKE2-party2V-mul(2m+3n1)lbq+n
A-3PAKE [30]3-party4Exp
Y-3PAKE [35]3-party3V-mul2[(mn+n)lbq+3n]
X-3PAKE [36]3-party3V-mul7nlbq+9n+5
3PAKE3-party2V-mul2[(2m+3n1)lbq+2n]