Comments on two anonymous conference key distribution systems

  • Authors:
  • Qiang Tang;Chris J. Mitchell

  • Affiliations:
  • Information Security Group, Royal Holloway, University of London, United Kingdom;Information Security Group, Royal Holloway, University of London, United Kingdom

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors' claim, and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.