2021
DOI: 10.1007/978-3-030-90428-9_5
|View full text |Cite
|
Sign up to set email alerts
|

PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…It is to be clear from Figure 1 that our scheme's performance constraint, namely the entire searchTime, is optimal and reduced in comparison to the existing protocols. Our scheme consumes the searchTime 0.09 s while the existing K. Pak et al [31], Y. Tang et al [32], I. Vazquez Sandoval et al [33] and C. M. Chen et al [34] protocols consume 7.74 s, 0.88 s, 9 s, and 4.9 s, respectively which is higher in comparison to our scheme. Due to the large execution time, all existing protocols have huge computational complexity in real-time execution.…”
Section: Simulation Resultsmentioning
confidence: 63%
See 2 more Smart Citations
“…It is to be clear from Figure 1 that our scheme's performance constraint, namely the entire searchTime, is optimal and reduced in comparison to the existing protocols. Our scheme consumes the searchTime 0.09 s while the existing K. Pak et al [31], Y. Tang et al [32], I. Vazquez Sandoval et al [33] and C. M. Chen et al [34] protocols consume 7.74 s, 0.88 s, 9 s, and 4.9 s, respectively which is higher in comparison to our scheme. Due to the large execution time, all existing protocols have huge computational complexity in real-time execution.…”
Section: Simulation Resultsmentioning
confidence: 63%
“…Figure 2 depicts the proposed scheme visited nodes as well as communication steps along with the diverse 3PAKE protocols explored during the last decade by various researchers. From Figure 2, it is clear that the suggested protocol is capable to visit over the 20 nodes, while the existing K. Pak et al [31], Y. Tang et al [32], I. Vazquez Sandoval et al [33] and C. M. Chen et al [34] protocols visit just over 18, 17, 13, and 15 nodes, respectively. Further, our protocol takes two communication steps in the testing procedure, which is optimal and minimum, while the existing protocols, i.e., K. Pak et al [31], Y. Tang et al [32], I. Vazquez Sandoval et al [33], and C. M. Chen et al [34], take 6, 6, 4, and 5 communication steps, respectively.…”
Section: Simulation Resultsmentioning
confidence: 94%
See 1 more Smart Citation