Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/825984 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832552680377024512 |
---|---|
author | Ang Yang Junghyun Nam Moonseong Kim Kim-Kwang Raymond Choo |
author_facet | Ang Yang Junghyun Nam Moonseong Kim Kim-Kwang Raymond Choo |
author_sort | Ang Yang |
collection | DOAJ |
description | We revisit the SM2 protocol, which is widely used in Chinese
commercial applications and by Chinese government agencies. Although
it is by now standard practice for protocol designers to provide security
proofs in widely accepted security models in order to assure protocol implementers
of their security properties, the SM2 protocol does not have
a proof of security. In this paper, we prove the security of the SM2 protocol
in the widely accepted indistinguishability-based Bellare-Rogaway
model under the elliptic curve discrete logarithm problem (ECDLP)
assumption. We also present a simplified and more efficient version of
the SM2 protocol with an accompanying security proof. |
format | Article |
id | doaj-art-fcf31b7f72fc45b6bfb953cab2816ce3 |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-fcf31b7f72fc45b6bfb953cab2816ce32025-02-03T05:58:15ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/825984825984Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange ProtocolsAng Yang0Junghyun Nam1Moonseong Kim2Kim-Kwang Raymond Choo3Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, AustraliaDepartment of Computer Engineering, Konkuk University, 268 Chungwondaero, Chungju, Chungcheongbuk-do 380-701, Republic of KoreaInformation Management Division, Korean Intellectual Property Office, 189 Cheongsaro, Daejeon 302-701, Republic of KoreaInformation Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, AustraliaWe revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof.http://dx.doi.org/10.1155/2014/825984 |
spellingShingle | Ang Yang Junghyun Nam Moonseong Kim Kim-Kwang Raymond Choo Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols The Scientific World Journal |
title | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_full | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_fullStr | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_full_unstemmed | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_short | Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols |
title_sort | provably secure chinese government sm2 and simplified sm2 key exchange protocols |
url | http://dx.doi.org/10.1155/2014/825984 |
work_keys_str_mv | AT angyang provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols AT junghyunnam provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols AT moonseongkim provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols AT kimkwangraymondchoo provablysecurechinesegovernmentsm2andsimplifiedsm2keyexchangeprotocols |