Comments on two anonymous conference key distribution systems

Tang, Qiang and Mitchell, Chris J

(2005)

Tang, Qiang and Mitchell, Chris J (2005) Comments on two anonymous conference key distribution systems. Computer Standards & Interfaces, 27 (7).

Our Full Text Deposits

Full text access: Open

Full Text - 88.3 KB

Links to Copies of this Item Held Elsewhere



Abstract

In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.

Information about this Version

This is a Submitted version
This version's date is: 10/2005
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/e5900d79-2058-13b5-444d-0c1a0c7ee624/7/

Item TypeJournal Article
TitleComments on two anonymous conference key distribution systems
AuthorsTang, Qiang
Mitchell, Chris J
Uncontrolled KeywordsKey distribution, User anonymity, security, encryption
Departments

Identifiers

doihttp://dx.doi.org/10.1016/j.csi.2004.08.006

Deposited by Research Information System (atira) on 02-Apr-2013 in Royal Holloway Research Online.Last modified on 02-Apr-2013

Notes

The eprint is the authors' final draft. The published version is at the Science Direct link given.
Copyright 2005 Elsevier Science B.V., Amsterdam.


Details