Research Article
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability
Table 3
Execution time of cryptographic primitives performed by the IoT device and the server.
| | XMSSSig/verify | ModularExp | Mult | Add | PRFE | PRFF | HashH | | fuzz | PUF | Total (ms) |
| Operations of the IoT device | Zhao et al. [20] | | | | | | | 14 (0.32 ms) | | 1 (2.6 ms) | 1 (0.13 ms) | 3.03 | Zheng et al. [22] | | | | | | | 1 (0.02 ms) | | | 2 (0.26 ms) | 0.28 | Zhang et al. [21] | | | | | | | 9 (0.21 ms) | | | 1 (0.13 ms) | 0.34 | Chan et al.’s scheme [1] | | | 2z + 1 (0.35) | 2z + 1 (0.06 ms) | 1 (0.04 ms) | | | | | | 0.36 | Liu et al.’s scheme [2] | | 3 (81.96 ms) | 2z (0.34) | 2z (0.05 ms) | 1 (0.04 ms) | 4z (0.96) | 5 (0.12 ms) | | | | 13.6 | Liu et al.’s P-quantum scheme [23] | | | 2z (0.04 ms) | 2z+1(0.01 ms) | 1 (0.02 ms) | 4z (1.4 ms) | 4 (0.06 ms) | 2 (1.4) | | | 6.2 | Our scheme | | 2 (9.1 ms) | 2 (0.006 ms) | 2 (0.001 ms) | | | 13 (0.31 ms) | | | | 9.4 | Our P-quantum scheme | 2 (6.8 ms) | | 2 (0.006 ms) | 2 (0.001 ms) | | | 13 (0.31 ms) | | | | 7.1 |
| Operations of the server | Zhao et al. [20] | | | | | | | 13 (0.91 ms) | | | | 0.91 | Zheng et al. [22] | | | | | | | 1 (0.07 ms) | | | | 0.07 | Zhang et al. [21] | | | | | | | 9 (0.63 ms) | | | | 0.63 | Chan et al.’s scheme [1] | | | 4z (0.04) | 4z (0.01 ms) | 1 (0.04 ms) | | | | | | 0.09 | Liu et al.’s scheme [2] | | 3 (1.69 ms) | 4z + 1 (0.04 ms) | 4z − 2 (0.01 ms) | 1 (0.02 ms) | 2z (0.7 ms) | 2z + 5 (0.73 ms) | | | | 2.4 | Liu et al.’s P-quantum scheme [23] | | | 4z (0.09 ms) | 4z + 1 (0.02 ms) | 1 (0.02 ms) | 4z (1.4 ms) | 2z + 4 (0.73 ms) | 2 (0.08) | | | 2.3 | Our scheme | | 2 (1.1 ms) | 2z + 1 (0.02 ms) | 2z − 2 (0.005 ms) | 1 (0.02 ms) | | 2z + 13 (0.74 ms) | | | | 1.88 | Our P-quantum secure scheme | 2 (2.8 ms) | | 2z+1(0.02 ms) | 2z − 2 (0.005 ms) | 1 (0.02 ms) | | 2z + 6 (0.73 ms) | | | | 3.5 |
|
|
= 256, elliptic curve: secp256k1, data item size = 0.00005 MB, z = 50. |