Research Article

Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

Table 1

Security and functionality comparison with Kim’s scheme.

Replay and fraud attack Basic forward secrecy Anonymity and untraceability Collusion attack

Kim’s Resistance Yes Yes No
Ours Resistance Yes Yes Resistance