Abstract:Security for composition of protocols is hotspot of international scope. By using composition method, it is proved that the distributed key distribution scheme introduced by Daza et al is secure. The scheme appends verifiable secret sharing and zero-knowledge proofs to the basic one which fits in the case of passive adversary to prevent from the action of an active adversary.