Comments on two anonymous conference key distribution systems

Chris J. Mitchell and Tang, Q.

(2005)

Chris J. Mitchell and Tang, Q. (2005) Comments on two anonymous conference key distribution systems. Computer Standards & Interfaces, 27 (7).

Our Full Text Deposits

Full text access: Open

Full Text - 88.3 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.

Information about this Version

This is a Published version
This version's date is: 10/2005
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/e5900d79-2058-13b5-444d-0c1a0c7ee624/1/

Item TypeJournal Article
TitleComments on two anonymous conference key distribution systems
AuthorsMitchell, Chris
Tang, Q.
Uncontrolled KeywordsKey distribution, User anonymity, security, encryption
DepartmentsFaculty of Science\Mathematics

Identifiers

doi10.1016/j.csi.2004.08.006

Deposited by () on 23-Dec-2009 in Royal Holloway Research Online.Last modified on 21-May-2010

Notes

The eprint is the authors' final draft. The published version is at the Science Direct link given.
Copyright 2005 Elsevier Science B.V., Amsterdam.


Details