Skip to main content
. 2024 Jan 31;10:e1791. doi: 10.7717/peerj-cs.1791

Table 4. Comparison of four-phase lattice-based PAKE protocols.

Hard problem Number of party Number of arithmetic operation Number of flow* Number of hash Reconciliation bound Reconciliation components Reusable key Used method for SLA resistance Anonymity Security model PFS
Dabra, Bala & Kumari (2020) RLWE 2 3 ×
3 +
9 3 q>164β2n23+2βn12 Cha(), Mod2() × Direct Public Key Validation From Zero-Knowledge Authentication RoR
Ding, Cheng & Qin (2022) RLWE 2 2 ×
2 +
9 3 q>16α3n52+αn12 Cha(), Mod2() Practical Randomized KE+ RoR
Islam & Basu (2021) LWE 3 10 3 q>16β2n23 Cha(), Mod2() × × × ROM
Li, Wang & Morais (2020) LWE 2 − − 2 4 For n,mnlogq, inner product <ek > should be negligible. × × × × ROM ×
BiGISIS.PAKE BiGISIS 2 2 ×
5 +/-
9 3 kś − k ∥  ≤ 2(8ϑ + β) MSB() BiP RoR

Notes.

*Total number of passes for all stages, ×, Multiplication; +, Addition; −, Subtraction; − −,No computation; , Number of arithmetic operations used in key component calculation; ROM, Random Oracle Model) +: According to Bindel, Stebila & Veitch (2021) and Qin et al. (2022), because of the used reconciliation, SLA is possible.