Research Article
Post-Quantum Secure Password-Authenticated Key Exchange Based on Ouroboros
Table 1
Time consumption of different security levels of OPAKE.
| Instance | n | w | | t | | Security | Time (ms) |
| OPAKE-80 | 5851 | 47 | 47 | 30 | 512 | 80 | 6.41 | OPAKE-128 | 13691 | 75 | 75 | 45 | 512 | 128 | 7.53 | OPAKE-256 | 40013 | 147 | 147 | 85 | 512 | 256 | 9.14 |
|
|