Research Article
A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
Table 1
Comparisons between our protocol and the previously proposed AGKE protocols.
| | Tseng’s AGKE [25] | Choi et al.’s ID-AGKE [26] | Wu et al.’s ID-AGKE [6] | Wu et al.’s RID-AGKE [4] | Our protocol |
| Public key setting | ElGmal | IDPKS | IDPKS | R-IDPKS | R-IDPKS |
| Certificate management | Required | Not required | Not required | Not required | Not required |
| Rounds | 2 | 2 | 2 | 3 | 2 |
| Computational cost for each participant | | | | | |
| Security | Provably secure | Existing attack [27] | Provably secure | Provably secure | Provably secure |
| Revocation functionality | Using CRL [28] | No | No | Yes | Yes |
| Resistant to malicious participants | Yes (confirmed computation) | No | Yes (confirmed computation) | Yes (explicit key confirmation) | Yes (confirmed computation) |
| Identifying malicious participants | Yes | No | Yes | No | Yes |
|
|