Cargando…

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...

Descripción completa

Detalles Bibliográficos
Autores principales: Yang, Ang, Nam, Junghyun, Kim, Moonseong, Choo, Kim-Kwang Raymond
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658/
https://www.ncbi.nlm.nih.gov/pubmed/25276863
http://dx.doi.org/10.1155/2014/825984