Comments on two anonymous conference key distribution systems
نویسندگان
چکیده
In this paper we consider the security of two recently proposed anonymous conference key distribution schemes. We show that neither scheme is as practical as the authors claim and that, in certain circumstances, both schemes also suffer from security vulnerabilities. We also show that the attack described in one paper is invalid.
منابع مشابه
Comments on the Yang-Chang-Hwang anonymous conference key distribution system
Yang et al. [Comput. Stand. Interfaces 25 (2003)] proposed a conference key distribution system (CKDS) based on the elliptic curve discrete logarithm problem (ECDLP). Their scheme used a line with a hash value to broadcast the conference key. In this article, we point out that it suffers from the attack by solving linear equations to obtain the hash value hi. Thus, the conference key CK can be ...
متن کاملCryptanalysis of an anonymous wireless authentication and conference key distribution scheme
In this paper we analyse an anonymous wireless authentication and conference key distribution scheme which is also designed to provide mobile participants with user identification privacy during the conference call. The proposed scheme consists of three sub-protocols: the Call Set-Up Authentication Protocol, the Hand-Off Authentication Protocol, and the Anonymous Conference Call Protocol. We sh...
متن کاملAnonymous and dynamic conference-key distribution system
In order to hold secure electronic conference in Communication networks via insecure channels, a conference key distribution system should be constructed. The conference key distribution system (CKDS) is used for distributing a conference key shared among the participants of the conference and hence secure communications are achieved. In this paper, by using the secret sharing scheme based on t...
متن کاملUser-anonymous and short-term Conference Key Distribution System via link-layer routing in mobile communications
There are occasions when some people carry their portable devices to a hotel room or office to hold a short-term conference over wireless networks. This paper designs a user-anonymous and short-term conference key distribution system to ensure secure communications over an open channel and to protect the identities of the users. Further, linker-layer routing between the mobile hosts makes it po...
متن کاملSecurity of Improved Identity-Based Conference Key Distribution Systems
At Crypto-87 conference, we proposed identity-based key distribution systems for generating a common secret conference key for two or more users. Protocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protoc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computer Standards & Interfaces
دوره 27 شماره
صفحات -
تاریخ انتشار 2005