Two-party cooperative blind signature based on SM2

SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularizati...

Full description

Saved in:
Bibliographic Details
Main Authors: Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022081
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529729629290496
author Xue BAI
Baodong QIN
Rui GUO
Dong ZHENG
author_facet Xue BAI
Baodong QIN
Rui GUO
Dong ZHENG
author_sort Xue BAI
collection DOAJ
description SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.
format Article
id doaj-art-ac747488b74f422dbbe7d36655ee0741
institution Kabale University
issn 2096-109X
language English
publishDate 2022-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-ac747488b74f422dbbe7d36655ee07412025-01-15T03:16:01ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-12-018395159574174Two-party cooperative blind signature based on SM2Xue BAIBaodong QINRui GUODong ZHENGSM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022081SM2two-party blind signaturekey securityprivacy protection
spellingShingle Xue BAI
Baodong QIN
Rui GUO
Dong ZHENG
Two-party cooperative blind signature based on SM2
网络与信息安全学报
SM2
two-party blind signature
key security
privacy protection
title Two-party cooperative blind signature based on SM2
title_full Two-party cooperative blind signature based on SM2
title_fullStr Two-party cooperative blind signature based on SM2
title_full_unstemmed Two-party cooperative blind signature based on SM2
title_short Two-party cooperative blind signature based on SM2
title_sort two party cooperative blind signature based on sm2
topic SM2
two-party blind signature
key security
privacy protection
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022081
work_keys_str_mv AT xuebai twopartycooperativeblindsignaturebasedonsm2
AT baodongqin twopartycooperativeblindsignaturebasedonsm2
AT ruiguo twopartycooperativeblindsignaturebasedonsm2
AT dongzheng twopartycooperativeblindsignaturebasedonsm2