This article mounts a conspiracy attack on the anonymous conference key distribution system without using a one-way hash function proposed by Tseng and Jan. The attack described in the article can reveal the participants’ common key shared with the chairperson.