Publication Type: Journal Article
Source: Information & Security: An International Journal, Volume 15, Issue 1, p.110-114 (2004)
Keywords: Conference Key Distribution System
, Discrete Logarithm.
, One-Way Hash Function
, User Anonymity
This article mounts a conspiracy attack on the anonymous conference key distribution system without using a one-way hash function proposed by Tseng and Jan. The attack described in the article can reveal the participants’ common key shared with the chairperson.