logo

SCIENCE CHINA Information Sciences, Volume 63 , Issue 8 : 189101(2020) https://doi.org/10.1007/s11432-018-9589-x

Secure two-party SM9 signing

Yongheng MU 1,2,3, Haixia XU 1,2,3,*, Peili LI 1,2, Tianjun MA 1,2,3
More info
  • ReceivedJun 1, 2018
  • AcceptedAug 30, 2018
  • PublishedMar 26, 2020

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Key R$\&$D Program of China (Grant No. 2017YFB0802500).


Supplement

The security proof of the protocol.


References

[1] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2009. http://www.bitcoin.org/bitcoin.pdf. Google Scholar

[2] Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1984. 47--53. Google Scholar

[3] Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of Symposium on Cryptography and Information Security, 2000. 26--28. Google Scholar

[4] Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceedings of Annual International Cryptology Conference, 2001. 213--229. Google Scholar

[5] Lindell Y. Fast secure two-party ECDSA signing. In: Proceedings of Annual International Cryptology Conference, 2017. 613--644. Google Scholar

[6] Desmedt Y, Frankel Y. Threshold cryptosystems. In: Proceedings of Conference on the Theory and Application of Cryptology, 1989. 307--315. Google Scholar

[7] Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Annual International Cryptology Conference, 1991. 457--469. Google Scholar

[8] Paillier P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 1999. 223--238. Google Scholar

[9] Canetti R, Lindell Y, Ostrovsky R, et al. Universally composable two-party and multi-party secure computation. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, 2002. 494--503. Google Scholar

Copyright 2020  CHINA SCIENCE PUBLISHING & MEDIA LTD.  中国科技出版传媒股份有限公司  版权所有

京ICP备14028887号-23       京公网安备11010102003388号