Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol
Multiple key agreement protocols produce several session keys instead of one session key. Most of the multiple key agreement protocols do not utilize the hash functions in the signature schemes used for identification. Not using hash function in these protocols causes that the protocols do not satisfy some requirement security properties. In this paper, the authors review the multiple key agreement protocols and perform attacks on some of them. Then, they introduce a new multiple key agreement protocol and show that the proposed protocol is more secure than the existent multiple key agreement protocols.