Research Article

Concurrently Deniable Group Key Agreement and Its Application to Privacy-Preserving VANETs

Algorithm 1

DB-GKA protocol without authentication.
Round 1: Participant performs the following steps:
(1) Choose and compute .
(2) Broadcast message .
Round 2: Upon receiving messages and , each does as following:
(1) Compute , , .
(2) Broadcast message .
Session Key Generation: Upon receiving all messages , each carries out the following steps:
(1) Compute orderly , .
(2) Check . If it is true, continue; Otherwise, abort.
(3) Generate the session key .