“…Several cryptographic primitives have tight security construction, such as public‐key encryption [4, 6, 8, 13 ], identity‐based encryption [9, 17 ], and signature scheme [5, 7, 18 ]. Unfortunately, most of the existing AKE protocols such as [10–12, 19–23 ] do not consider tight security. To achieve tight security, Bader et al 's protocol [4 ] used multi‐user secure KEM and multi‐user secure signature scheme as building blocks, and has a three‐pass execution.…”