Figure 1.

Figure 2.

Figure 3.

Figure 4.
![Basic Key Exchange from PReFs [9]](https://sciendo-parsed.s3.eu-central-1.amazonaws.com/6964d3bc7c29e05adc52d013/j_ias-2025-0009_fig_004.jpg?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=ASIA6AP2G7AKC5BACSB4%2F20260112%2Feu-central-1%2Fs3%2Faws4_request&X-Amz-Date=20260112T223024Z&X-Amz-Expires=3600&X-Amz-Security-Token=IQoJb3JpZ2luX2VjECkaDGV1LWNlbnRyYWwtMSJGMEQCIAQIuORBKXm%2BYZNinaGSNIx702RbeQWWitAH%2BfF7YKZEAiAFd2UkVdOVE8Xqld%2Fk%2BFdb1ueptUtPronoCWlKCl4%2FHyrGBQjy%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAIaDDk2MzEzNDI4OTk0MCIMOI7%2FTSW%2F%2BoD7kE0zKpoFcne0a6Ns1Qf1bXiLJZXC8P1vXnZo%2BTbxR61yOd3Z9xRrPNqsyCFu7JQeuFH3kxnhhZ6e3bLCq6h5O13oN%2B5nbidp7zEiw0v2N0aPeNnjHs88gazbg6ZY80%2Bk0vc0k4otIXinZ4%2BKpmCPg899fVOlFoEQeDrTs59x0ZNmWdhNREeDw%2BBQy4%2B520TDt2p56Q94HCa%2FCfzF73FGLiosf6xh3f0no1jyfre%2FGhRqs81FKqvpFsPnEY39FRtJAdezU%2FQodYf8gn8bUeySmwpdGVbJEAfvWId23gjYDD05j4%2ByIYRWM18CkrwYhWLiMkOKwDTi83hNORRkhzJD8jgLcOfrwVpBBqe7WtdXU9hu7Nv5LTAtA5vE4k28P0f4u%2Ft6d4OQeskifCgw0NBo6frhL%2BM86BBnCxBYB6cgbWhHmG%2FgVFjHrmxMCh7dq62oAaTcYwY1t76N6fl4s7xVLaLLvq92Eh6Rjo5TtXE8623woVYIjX4WRk5tJK6W99pOkx5FD7PMY1vkebhYO70wv3lkktG7YRnzL0ujOpmHE5Rt%2BVIqsKDExkABXpK74Y2OwhEc4Eg9xJBdomt4kvz%2Bjbp2S88vdO5L72%2FiAIQ%2BddmBCbDxiGehQHcUWQ7o74328McT7Du5%2B3T494oyDwZxU5Q5fCEVqEBVaC7s24dFPLuymnvTCtRx21kD45aONFSFNt4bBMcYPQhLOyjn7dRyklrh24IdZi9G4Lsxeon4CpWbbzrWUHtF%2BGivb9xFnOZ29pBkoDg1WIE%2BYwFlvcObyqZEcLnshDFR06TK9cZWMjGmd%2BZdRp5nadRU7fuahJ51ww2H7%2Bavi1%2Fv7qGBAqdH%2BpJ7XFaj7KbOwnCXlGJ3g0Vh1FCs9%2Fu0deJzBS8GICxmMK7alMsGOrIBz1nDu1wtQbFLpJWFpIkYZQqMhqZZjfPawOQB2ZQbfTHNPXFUBZ9dpwGmy6eM%2FGerfZz0B7xlssBgSUqCyJgSEEptMtZUoxCjvlgtryZAYLW%2Bnxf703%2BiWzmD3WrS5uoBztqd2Z9DlWPNn7mJ1ZwA%2BLQ4ji57PWTBp8mgmdXRrQJbSth50W8LZGslN09S8SMkFhwSAWijbc3%2FzQWG8Z4idPWVjkoXw40IYJ6xsz2Gk2oG%2BQ%3D%3D&X-Amz-Signature=880502d8479e9997ee8df7e164dba4c21d4571ccb5c562d836faab6e7c1344b7&X-Amz-SignedHeaders=host&x-amz-checksum-mode=ENABLED&x-id=GetObject)
Figure 5.
![Upgraded AKE protocol using PReFs [9]](https://sciendo-parsed.s3.eu-central-1.amazonaws.com/6964d3bc7c29e05adc52d013/j_ias-2025-0009_fig_005.jpg?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=ASIA6AP2G7AKC5BACSB4%2F20260112%2Feu-central-1%2Fs3%2Faws4_request&X-Amz-Date=20260112T223024Z&X-Amz-Expires=3600&X-Amz-Security-Token=IQoJb3JpZ2luX2VjECkaDGV1LWNlbnRyYWwtMSJGMEQCIAQIuORBKXm%2BYZNinaGSNIx702RbeQWWitAH%2BfF7YKZEAiAFd2UkVdOVE8Xqld%2Fk%2BFdb1ueptUtPronoCWlKCl4%2FHyrGBQjy%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAIaDDk2MzEzNDI4OTk0MCIMOI7%2FTSW%2F%2BoD7kE0zKpoFcne0a6Ns1Qf1bXiLJZXC8P1vXnZo%2BTbxR61yOd3Z9xRrPNqsyCFu7JQeuFH3kxnhhZ6e3bLCq6h5O13oN%2B5nbidp7zEiw0v2N0aPeNnjHs88gazbg6ZY80%2Bk0vc0k4otIXinZ4%2BKpmCPg899fVOlFoEQeDrTs59x0ZNmWdhNREeDw%2BBQy4%2B520TDt2p56Q94HCa%2FCfzF73FGLiosf6xh3f0no1jyfre%2FGhRqs81FKqvpFsPnEY39FRtJAdezU%2FQodYf8gn8bUeySmwpdGVbJEAfvWId23gjYDD05j4%2ByIYRWM18CkrwYhWLiMkOKwDTi83hNORRkhzJD8jgLcOfrwVpBBqe7WtdXU9hu7Nv5LTAtA5vE4k28P0f4u%2Ft6d4OQeskifCgw0NBo6frhL%2BM86BBnCxBYB6cgbWhHmG%2FgVFjHrmxMCh7dq62oAaTcYwY1t76N6fl4s7xVLaLLvq92Eh6Rjo5TtXE8623woVYIjX4WRk5tJK6W99pOkx5FD7PMY1vkebhYO70wv3lkktG7YRnzL0ujOpmHE5Rt%2BVIqsKDExkABXpK74Y2OwhEc4Eg9xJBdomt4kvz%2Bjbp2S88vdO5L72%2FiAIQ%2BddmBCbDxiGehQHcUWQ7o74328McT7Du5%2B3T494oyDwZxU5Q5fCEVqEBVaC7s24dFPLuymnvTCtRx21kD45aONFSFNt4bBMcYPQhLOyjn7dRyklrh24IdZi9G4Lsxeon4CpWbbzrWUHtF%2BGivb9xFnOZ29pBkoDg1WIE%2BYwFlvcObyqZEcLnshDFR06TK9cZWMjGmd%2BZdRp5nadRU7fuahJ51ww2H7%2Bavi1%2Fv7qGBAqdH%2BpJ7XFaj7KbOwnCXlGJ3g0Vh1FCs9%2Fu0deJzBS8GICxmMK7alMsGOrIBz1nDu1wtQbFLpJWFpIkYZQqMhqZZjfPawOQB2ZQbfTHNPXFUBZ9dpwGmy6eM%2FGerfZz0B7xlssBgSUqCyJgSEEptMtZUoxCjvlgtryZAYLW%2Bnxf703%2BiWzmD3WrS5uoBztqd2Z9DlWPNn7mJ1ZwA%2BLQ4ji57PWTBp8mgmdXRrQJbSth50W8LZGslN09S8SMkFhwSAWijbc3%2FzQWG8Z4idPWVjkoXw40IYJ6xsz2Gk2oG%2BQ%3D%3D&X-Amz-Signature=02c697537700c8db368f7ec981223df3465ed9026e748e5be0ddb6bb6d02d246&X-Amz-SignedHeaders=host&x-amz-checksum-mode=ENABLED&x-id=GetObject)
Figure 6.
![Forward Secure AKE protocol using PReFs [9]](https://sciendo-parsed.s3.eu-central-1.amazonaws.com/6964d3bc7c29e05adc52d013/j_ias-2025-0009_fig_006.jpg?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Content-Sha256=UNSIGNED-PAYLOAD&X-Amz-Credential=ASIA6AP2G7AKC5BACSB4%2F20260112%2Feu-central-1%2Fs3%2Faws4_request&X-Amz-Date=20260112T223024Z&X-Amz-Expires=3600&X-Amz-Security-Token=IQoJb3JpZ2luX2VjECkaDGV1LWNlbnRyYWwtMSJGMEQCIAQIuORBKXm%2BYZNinaGSNIx702RbeQWWitAH%2BfF7YKZEAiAFd2UkVdOVE8Xqld%2Fk%2BFdb1ueptUtPronoCWlKCl4%2FHyrGBQjy%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F8BEAIaDDk2MzEzNDI4OTk0MCIMOI7%2FTSW%2F%2BoD7kE0zKpoFcne0a6Ns1Qf1bXiLJZXC8P1vXnZo%2BTbxR61yOd3Z9xRrPNqsyCFu7JQeuFH3kxnhhZ6e3bLCq6h5O13oN%2B5nbidp7zEiw0v2N0aPeNnjHs88gazbg6ZY80%2Bk0vc0k4otIXinZ4%2BKpmCPg899fVOlFoEQeDrTs59x0ZNmWdhNREeDw%2BBQy4%2B520TDt2p56Q94HCa%2FCfzF73FGLiosf6xh3f0no1jyfre%2FGhRqs81FKqvpFsPnEY39FRtJAdezU%2FQodYf8gn8bUeySmwpdGVbJEAfvWId23gjYDD05j4%2ByIYRWM18CkrwYhWLiMkOKwDTi83hNORRkhzJD8jgLcOfrwVpBBqe7WtdXU9hu7Nv5LTAtA5vE4k28P0f4u%2Ft6d4OQeskifCgw0NBo6frhL%2BM86BBnCxBYB6cgbWhHmG%2FgVFjHrmxMCh7dq62oAaTcYwY1t76N6fl4s7xVLaLLvq92Eh6Rjo5TtXE8623woVYIjX4WRk5tJK6W99pOkx5FD7PMY1vkebhYO70wv3lkktG7YRnzL0ujOpmHE5Rt%2BVIqsKDExkABXpK74Y2OwhEc4Eg9xJBdomt4kvz%2Bjbp2S88vdO5L72%2FiAIQ%2BddmBCbDxiGehQHcUWQ7o74328McT7Du5%2B3T494oyDwZxU5Q5fCEVqEBVaC7s24dFPLuymnvTCtRx21kD45aONFSFNt4bBMcYPQhLOyjn7dRyklrh24IdZi9G4Lsxeon4CpWbbzrWUHtF%2BGivb9xFnOZ29pBkoDg1WIE%2BYwFlvcObyqZEcLnshDFR06TK9cZWMjGmd%2BZdRp5nadRU7fuahJ51ww2H7%2Bavi1%2Fv7qGBAqdH%2BpJ7XFaj7KbOwnCXlGJ3g0Vh1FCs9%2Fu0deJzBS8GICxmMK7alMsGOrIBz1nDu1wtQbFLpJWFpIkYZQqMhqZZjfPawOQB2ZQbfTHNPXFUBZ9dpwGmy6eM%2FGerfZz0B7xlssBgSUqCyJgSEEptMtZUoxCjvlgtryZAYLW%2Bnxf703%2BiWzmD3WrS5uoBztqd2Z9DlWPNn7mJ1ZwA%2BLQ4ji57PWTBp8mgmdXRrQJbSth50W8LZGslN09S8SMkFhwSAWijbc3%2FzQWG8Z4idPWVjkoXw40IYJ6xsz2Gk2oG%2BQ%3D%3D&X-Amz-Signature=9ad3052cb7a512e1ff3e4aa3f4bf1914c3ea1e659d07ac188930b37eee575bb4&X-Amz-SignedHeaders=host&x-amz-checksum-mode=ENABLED&x-id=GetObject)
Comparison: SK, EPA, PR, EPM and MEx refer to symmetric key operations, elliptic curve point addition, pairing on elliptic curves, elliptic curve point multiplication and the number of exchanged messages respectively
| Scheme | Computation Time in μs | Forward secrecy | Communication overhead (in bits) | storage | ||
|---|---|---|---|---|---|---|
| Operations | Intel | ARM | ||||
| [24] | 4 hash & 12 MAC & 10ENC | ≈ 7.28 | ≈78.07 | yes | 7872 | yes |
| [25] | 8 Hash & 6 hash-to-point & 4 EPM | ≈ 304.34 | ≈ 3463.07 | yes | 9312 | yes |
| [26] | 14 Hash & 20 hash-to-point & 8 EPM & 16 EPA & 4 PR | ≈ 3527.5 | ≈ 39989.8 | yes | 9856 | yes |
| [27] | 6 Hash & 12 PRF & 3 GroupExp | ≈ 579.9 | ≈ 11715.6 | yes | 1952 | yes |
| [28] | 12 Hash & 14 EPM & 4 EPA | ≈ 1054.96 | ≈ 11968.2 | yes | 4160 | yes |
| [29] | 12 Hash & 4 Enc | ≈ 4. 12 | ≈ 57.44 | yes | 2880 | yes |
| [30] | 8 hash | ≈ 2.48 | ≈ 36.04 | yes | 1216 | yes |
| Ours | 4 hash | ≈ 1.24 | ≈ 18.02 | yes | 704 | no |