Research Article
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS
Table 1
Security and functionality comparison with Kim’s scheme.
| | Replay and fraud attack | Basic forward secrecy | Anonymity and untraceability | Collusion attack |
| Kim’s | Resistance | Yes | Yes | No | Ours | Resistance | Yes | Yes | Resistance |
|
|