Cargando…

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...

Descripción completa

Detalles Bibliográficos
Autores principales: Yang, Ang, Nam, Junghyun, Kim, Moonseong, Choo, Kim-Kwang Raymond
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658/
https://www.ncbi.nlm.nih.gov/pubmed/25276863
http://dx.doi.org/10.1155/2014/825984
_version_ 1782335446735388672
author Yang, Ang
Nam, Junghyun
Kim, Moonseong
Choo, Kim-Kwang Raymond
author_facet Yang, Ang
Nam, Junghyun
Kim, Moonseong
Choo, Kim-Kwang Raymond
author_sort Yang, Ang
collection PubMed
description We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof.
format Online
Article
Text
id pubmed-4167658
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-41676582014-09-28 Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols Yang, Ang Nam, Junghyun Kim, Moonseong Choo, Kim-Kwang Raymond ScientificWorldJournal Research Article We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. Hindawi Publishing Corporation 2014 2014-09-02 /pmc/articles/PMC4167658/ /pubmed/25276863 http://dx.doi.org/10.1155/2014/825984 Text en Copyright © 2014 Ang Yang et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Yang, Ang
Nam, Junghyun
Kim, Moonseong
Choo, Kim-Kwang Raymond
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_full Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_fullStr Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_full_unstemmed Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_short Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_sort provably-secure (chinese government) sm2 and simplified sm2 key exchange protocols
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658/
https://www.ncbi.nlm.nih.gov/pubmed/25276863
http://dx.doi.org/10.1155/2014/825984
work_keys_str_mv AT yangang provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols
AT namjunghyun provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols
AT kimmoonseong provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols
AT chookimkwangraymond provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols