Research Article
Tropical Cryptography Based on Multiple Exponentiation Problem of Matrices
Table 2
Performance comparison under some different parameters.
| k | n | s | Upper bound of sk (bit) | Upper bound of pk (kB) | Timing of (s) |
| 9 | 80 | 2 | 80 | 682 | 1.798 | 14 | 50 | 3 | 80 | 748 | 1.463 | 19 | 40 | 4 | 80 | 879 | 2.372 | 23 | 34 | 5 | 80 | 1031 | 3.210 | 28 | 31 | 6 | 80 | 1197 | 4.316 |
|
|