Attacks on Tanaka's non-interactive key sharing scheme

We propose two different methods for attacking Tanaka's (see Proc SCIS'94, Jan., 1994) identity-based non-interactive key sharing (IDNIKS) scheme. One method is used to find secret information using public parameters, and the other is used to find the center's secret keys by collusion.