Cargando…
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658/ https://www.ncbi.nlm.nih.gov/pubmed/25276863 http://dx.doi.org/10.1155/2014/825984 |
_version_ | 1782335446735388672 |
---|---|
author | Yang, Ang Nam, Junghyun Kim, Moonseong Choo, Kim-Kwang Raymond |
author_facet | Yang, Ang Nam, Junghyun Kim, Moonseong Choo, Kim-Kwang Raymond |
author_sort | Yang, Ang |
collection | PubMed |
description | We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. |
format | Online Article Text |
id | pubmed-4167658 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-41676582014-09-28 Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols Yang, Ang Nam, Junghyun Kim, Moonseong Choo, Kim-Kwang Raymond ScientificWorldJournal Research Article We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. Hindawi Publishing Corporation 2014 2014-09-02 /pmc/articles/PMC4167658/ /pubmed/25276863 http://dx.doi.org/10.1155/2014/825984 Text en Copyright © 2014 Ang Yang et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Yang, Ang Nam, Junghyun Kim, Moonseong Choo, Kim-Kwang Raymond Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_full | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_fullStr | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_full_unstemmed | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_short | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_sort | provably-secure (chinese government) sm2 and simplified sm2 key exchange protocols |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658/ https://www.ncbi.nlm.nih.gov/pubmed/25276863 http://dx.doi.org/10.1155/2014/825984 |
work_keys_str_mv | AT yangang provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols AT namjunghyun provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols AT kimmoonseong provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols AT chookimkwangraymond provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols |