Research Article
Concurrently Deniable Group Key Agreement and Its Application to Privacy-Preserving VANETs
Algorithm 2
Our deniable group key agreement protocol.
Let denote the private/public key pair for the participant and is the number of the participants of this | session. | Round 1: Participant performs the following steps: | (1) Choose and compute , . | (2) Broadcast message . | Round 2: Upon the receipt of all messages , parses , and . Next, executes the | following operations: | (1) Compute , , , . | (2) Generate a two-member ring signature on the message : . | (3) Broadcast message . | Session Key Generation: Upon the receipt of all messages , each carries out the following steps: | (1) Compute orderly , . Check . If it is true, | continue; Otherwise, abort. | (2) Check hold or not for and . If it fails to any participant, abort; Otherwise, | continue. | (3) Generate the session key . |
|