Tang, Qiang and Mitchell, Chris J (2005) Comments on two anonymous conference key distribution systems. Computer Standards & Interfaces, 27 (7).
Full text access: Open
In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.
This is a Submitted version This version's date is: 10/2005 This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/e5900d79-2058-13b5-444d-0c1a0c7ee624/3/
Deposited by Research Information System (atira) on 06-Jun-2012 in Royal Holloway Research Online.Last modified on 06-Jun-2012
The eprint is the authors' final draft. The published version is at the Science Direct link given. Copyright 2005 Elsevier Science B.V., Amsterdam.