首页 | 本学科首页   官方微博 | 高级检索  
     

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
作者姓名:Yudi ZHANG  Debiao HE  Mingwu ZHANG  Kim-Kwang Raymond CHOO
作者单位:Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;School of Computer Sciences;Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering
基金项目:supported in part by the National Key Research and Development Program of China(2018YFC1315404);the National Natural Science Foundation of China(Grant Nos.61572379,and 61501333);the fund of the Jiangsu Key Laboratory of Big Data Security&Intelligent Processing(BDSIP1807).
摘    要:Mobile devices are widely used for data access,communications and storage.However,storing a private key for signature and other cryptographic usage on a single mobile device can be challenging,due to its computational limitations.Thus,a number of(t,n)threshold secret sharing schemes designed to minimize private key from leakage have been proposed in the literature.However,existing schemes generally suffer from key reconstruction attack.In this paper,we propose an efficient and secure two-party distributed signing protocol for the SM2 signature algorithm.The latter has been mandated by the Chinese government for all electronic commerce applications.The proposed protocol separates the private key to storage on two devices and can generate a valid signature without the need to reconstruct the entire private key.We prove that our protocol is secure under nonstandard assumption.Then,we implement our protocol using MIRACL Cryptographic SDK to demonstrate that the protocol can be deployed in practice to prevent key disclosure.

关 键 词:SM2  SIGNATURE  two-party  signing  wireless  environment  provable  security  threshold  secret  sharing

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
Yudi ZHANG,Debiao HE,Mingwu ZHANG,Kim-Kwang Raymond CHOO.A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm[J].Frontiers of Computer Science,2020,14(3):143803-215.
Authors:Yudi ZHANG  Debiao HE  Mingwu ZHANG  Kim-Kwang Raymond CHOO
Affiliation:1. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education, School of Cyber Science and Engineering,Wuhan University,Wuhan 430072, China2. School of Computer Sciences, Hubei University of Technology,Wuhan 430068, China3. Department of Information Systems and Cyber Security and Department of Electrical and Computer Engineering, University of Texas at San Antonio, San Antonio, TX 78249, USA
Abstract:Mobile devices are widely used for data access, communications and storage. However, storing a private key for signature and other cryptographic usage on a single mobile device can be challenging, due to its computational limitations. Thus, a number of (t, n) threshold secret sharing schemes designed to minimize private key from leakage have been proposed in the literature. However, existing schemes generally suffer from key reconstruction attack. In this paper, we propose an efficient and secure two-party distributed signing protocol for the SM2 signature algorithm. The latter has been mandated by the Chinese government for all electronic commerce applications. The proposed protocol separates the private key to storage on two devices and can generate a valid signature without the need to reconstruct the entire private key. We prove that our protocol is secure under nonstandard assumption. Then, we implement our protocol using MIRACL Cryptographic SDK to demonstrate that the protocol can be deployed in practice to prevent key disclosure.
Keywords:SM2 signature  two-party signing  wireless environment  provable security  threshold secret sharing  
本文献已被 维普 等数据库收录!
点击此处可从《Frontiers of Computer Science》浏览原始摘要信息
点击此处可从《Frontiers of Computer Science》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号