1. Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols
- Author
-
Ang Yang, Junghyun Nam, Kim-Kwang Raymond Choo, Moonseong Kim, Yang, Ang, Nam, Junghyun, Kim, Moonseong, and Choo, Kim Kwang
- Subjects
China ,Article Subject ,security proofs ,Computer science ,lcsh:Medicine ,security ,SM2 protocol ,Computer security ,computer.software_genre ,Mathematical proof ,lcsh:Technology ,General Biochemistry, Genetics and Molecular Biology ,Computer Communication Networks ,Security association ,Universal composability ,lcsh:Science ,Protocol (object-oriented programming) ,Key exchange ,Computer Security ,General Environmental Science ,elliptic curve discrete logarithm problem ,lcsh:T ,lcsh:R ,Reproducibility of Results ,General Medicine ,Cryptographic protocol ,Computer security model ,Models, Theoretical ,Security service ,Government ,Bellare Rogaway model ,lcsh:Q ,computer ,Algorithms ,Confidentiality ,Research Article - Abstract
We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption.We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof. Refereed/Peer-reviewed
- Published
- 2014