Research Article

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability

Table 3

Execution time of cryptographic primitives performed by the IoT device and the server.

XMSSSig/verifyModularExpMultAddPRFEPRFFHashHfuzzPUFTotal (ms)

Operations of the IoT device
Zhao et al. [20]14 (0.32 ms)1 (2.6 ms)1 (0.13 ms)3.03
Zheng et al. [22]1 (0.02 ms)2 (0.26 ms)0.28
Zhang et al. [21]9 (0.21 ms)1 (0.13 ms)0.34
Chan et al.’s scheme [1]2z + 1 (0.35)2z + 1 (0.06 ms)1 (0.04 ms)0.36
Liu et al.’s scheme [2]3 (81.96 ms)2z (0.34)2z (0.05 ms)1 (0.04 ms)4z (0.96)5 (0.12 ms)13.6
Liu et al.’s P-quantum scheme [23]2z (0.04 ms)2z+1(0.01 ms)1 (0.02 ms)4z (1.4 ms)4 (0.06 ms)2 (1.4)6.2
Our scheme2 (9.1 ms)2 (0.006 ms)2 (0.001 ms)13 (0.31 ms)9.4
Our P-quantum scheme2 (6.8 ms)2 (0.006 ms)2 (0.001 ms)13 (0.31 ms)7.1

Operations of the server
Zhao et al. [20]13 (0.91 ms)0.91
Zheng et al. [22]1 (0.07 ms)0.07
Zhang et al. [21]9 (0.63 ms)0.63
Chan et al.’s scheme [1]4z (0.04)4z (0.01 ms)1 (0.04 ms)0.09
Liu et al.’s scheme [2]3 (1.69 ms)4z + 1 (0.04 ms)4z − 2 (0.01 ms)1 (0.02 ms)2z (0.7 ms)2z + 5 (0.73 ms)2.4
Liu et al.’s P-quantum scheme [23]4z (0.09 ms)4z + 1 (0.02 ms)1 (0.02 ms)4z (1.4 ms)2z + 4 (0.73 ms)2 (0.08)2.3
Our scheme2 (1.1 ms)2z + 1 (0.02 ms)2z − 2 (0.005 ms)1 (0.02 ms)2z + 13 (0.74 ms)1.88
Our P-quantum secure scheme2 (2.8 ms)2z+1(0.02 ms)2z − 2 (0.005 ms)1 (0.02 ms)2z + 6 (0.73 ms)3.5

 = 256, elliptic curve: secp256k1, data item size = 0.00005 MB, z = 50.