Common use of Computation Costs Clause in Contracts

Computation Costs. The computation costs are measured by counting the number of most compute intensive operations and taking their corresponding computational time into account. We denote the timing for the bilinear pairing as Tb, the point multiplication Tmp, point addition Tap, modular exponentiation Te, a symmetric encryption/decryption Ts, and hash operation Th. The timings of these operations have been computed in [25] on a personal computer with a 2.5 GHz CPU, an 8 GB RAM and Windows 7 as OS for an 80-bit security level. This corresponds with a hash function resulting in a 160-bit output and an EC of order 160, i.e., q = 160. For the timing of the same operations on a more constrained device, mimicking a SM, a single core 798 MHz CPU and 256 MB of RAM is chosen. We refer to [14] for the corresponding timings. In addition, similar as in [14], the time to execute a 128-bit arbiter PUF call on an embedded device MSP430 micro controller with 798 MHz CPU is derived from [26]. For the time to execute a fuzzy extractor generation operation, TFE.Gen, and a fuzzy extractor reconstruction operation, TRE.Rec, the code offset mechanism using the Bose-Chaudhuri-Hocquenghem (BCH) code is considered, as in [27]. Table 3 shows the comparison of the computational overheads between our scheme and [9–11,14]. As it can be seen, our scheme is offering a better overall computational complexity compared to most of the other schemes. The complexity is very close to the scheme of [12]. However, the scheme of [11] is still slightly more efficient at the side of the SM. This cost in performance needs to be paid in order to offer resistance in the CK security model. In addition, there is a huge difference in complexity with [14] at the SM, as the timing in [14] strictly depends on the efficiency of the PUF and the fuzzy extractor and no EC operations are computed. However, it should be noted that the fuzzy extractor of the PUF has several severe limitations [15]. Scheme Cost at SM ms Cost at SP µs [9] [10] 4Tmp + 4Tap + Te + 5Th ≈31.59 3Tmp + 2Tap + 2Tb + Te + 5Th ≈38.27 Table 3. Comparison of computational complexity among other schemes. 3Tmp + Tap + Te + 6Th ≈25.72 2Tmp + Tap + 2Tb + Te + 6Th ≈37.28 [11] 2Tmp + Te + 5Th ≈19.79 3Tmp + Tb + Te + 5Th ≈21.26 [12] 4Tmp + Tap + 5Th ≈23.80 4Tmp + Tap + 5Th ≈3.98 [14] 5Th + TPUF + TFE.Rec ≈ 3.53 6Th + TRE.Gen ≈1170 Ours 4Tmp + Tap + Ts + 5Th ≈23.81 4Tmp + 2Tap + Ts + 5Th ≈3.99

Appears in 3 contracts

Samples: Key Agreement, Key Agreement, Key Agreement

AutoNDA by SimpleDocs

Computation Costs. The computation costs are measured by counting the number of most compute intensive operations and taking their corresponding computational time into account. We denote the timing for the bilinear pairing as Tb, the point multiplication Tmp, point addition Tap, modular exponentiation Te, a symmetric encryption/decryption Ts, and hash operation Th. The timings of these operations have been computed in [25] on a personal computer with a 2.5 GHz CPU, an 8 GB RAM and Windows 7 as OS for an 80-bit security level. This corresponds with a hash function resulting in a 160-bit output and an EC of order 160, i.e., q = 160. For the timing of the same operations on a more constrained device, mimicking a SM, a single core 798 MHz CPU and 256 MB of RAM is chosen. We refer to [14] for the corresponding timings. In addition, similar as in [14], the time to execute a 128-bit arbiter PUF call on an embedded device MSP430 micro controller with 798 MHz CPU is derived from [26]. For the time to execute a fuzzy extractor generation operation, TFE.Gen, and a fuzzy extractor reconstruction operation, TRE.Rec, the code offset mechanism using the Bose-Chaudhuri-Hocquenghem (BCH) code is considered, as in [27]. Table 3 shows the comparison of the computational overheads between our scheme and [9–11,14]. As it can be seen, our scheme is offering a better overall computational complexity compared to most of the other schemes. The complexity is very close to the scheme of [12]. However, the scheme of [11] is still slightly more efficient at the side of the SM. This cost in performance needs to be paid in order to offer resistance in the CK security model. In addition, there is a huge difference in complexity with [14] at the SM, as the timing in [14] strictly depends on the efficiency of the PUF and the fuzzy extractor and no EC operations are computed. However, it should be noted that the fuzzy extractor of the PUF has several severe limitations [15]. Scheme Cost at SM ms Cost at SP µs [9] [10] 4Tmp + 4Tap + Te + 5Th ≈31.59 3Tmp + 2Tap + 2Tb + Te + 5Th ≈38.27 Table 3. Comparison of computational complexity among other schemes. 3Tmp + Tap + Te + 6Th ≈25.72 2Tmp + Tap + 2Tb + Te + 6Th ≈37.28 [11] 2Tmp + Te + 5Th ≈19.79 3Tmp + Tb + Te + 5Th ≈21.26 [12] 4Tmp + Tap + 5Th ≈23.80 4Tmp + Tap + 5Th ≈3.98 [14] 5Th + TPUF + TFE.Rec ≈ 3.53 6Th + TRE.Gen ≈1170 Ours 4Tmp + Tap + Ts + 5Th ≈23.81 4Tmp + 2Tap + Ts + 5Th ≈3.99

Appears in 1 contract

Samples: Open Access License

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!