Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...

Full description

Saved in:
Bibliographic Details
Main Authors: Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/825984
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832552680377024512
author Ang Yang
Junghyun Nam
Moonseong Kim
Kim-Kwang Raymond Choo
author_facet Ang Yang
Junghyun Nam
Moonseong Kim
Kim-Kwang Raymond Choo
author_sort Ang Yang
collection DOAJ
description We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof.
format Article
id doaj-art-fcf31b7f72fc45b6bfb953cab2816ce3
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-fcf31b7f72fc45b6bfb953cab2816ce32025-02-03T05:58:15ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/825984825984Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange ProtocolsAng Yang0Junghyun Nam1Moonseong Kim2Kim-Kwang Raymond Choo3Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, AustraliaDepartment of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbuk-do 380-701, Republic of KoreaInformation Management Division, Korean Intellectual Property Office, 189 Cheongsaro, Daejeon 302-701, Republic of KoreaInformation Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, AustraliaWe revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof.http://dx.doi.org/10.1155/2014/825984
spellingShingle Ang Yang
Junghyun Nam
Moonseong Kim
Kim-Kwang Raymond Choo
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
The Scientific World Journal
title Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_full Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_fullStr Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_full_unstemmed Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_short Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
title_sort provably secure chinese government sm2 and simplified sm2 key exchange protocols
url http://dx.doi.org/10.1155/2014/825984
work_keys_str_mv AT angyang provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols
AT junghyunnam provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols
AT moonseongkim provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols
AT kimkwangraymondchoo provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols