Research Article

A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

Table 1

Comparisons between our protocol and the previously proposed AGKE protocols.

Tseng’s AGKE [25] Choi et al.’s ID-AGKE [26]Wu et al.’s ID-AGKE [6]Wu et al.’s RID-AGKE [4]Our protocol

Public key settingElGmalIDPKSIDPKSR-IDPKSR-IDPKS

Certificate managementRequiredNot requiredNot requiredNot requiredNot required

Rounds22232

Computational cost for each participant

SecurityProvably secureExisting attack [27]Provably secureProvably secureProvably secure

Revocation functionalityUsing CRL [28]NoNoYesYes

Resistant to malicious participants Yes (confirmed computation)NoYes (confirmed computation)Yes (explicit key confirmation)Yes (confirmed computation)

Identifying malicious participantsYesNoYesNoYes