ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2020, Vol. 57 ›› Issue (10): 2136-2146.doi: 10.7544/issn1000-1239.2020.20200401

Special Issue: 2020密码学与数据隐私保护研究专题

Previous Articles     Next Articles

Efficient Two-Party SM2 Signing Protocol for Mobile Internet

Feng Qi1,2, He Debiao1,2, Luo Min1, Li Li1   

  1. 1(School of Cyber Science and Engineering, Wuhan University, Wuhan 430072);2(State Key Laboratory of Cryptology, Beijing 100878)
  • Online:2020-10-01
  • Supported by: 
    This work was supported by the National Key Research and Development Program of China (2018YFC1604000) and the National Natural Science Foundation of China (61932016, 61972294).

Abstract: Rapid development of wireless communication technology has greatly promoted the ubiquitousness of mobile devices. Mobile devices enable users to access Internet services anytime and anywhere. Because of the conjecture of the cyberspace, the digital signature is used as a kind of technique with the functionality of the integrity authentication, identification, and non-repudiation. However, mobile devices tend to be more easily lost or hijacked cause relatively weak protection on the private keys (the root of the digital signatures trust). To ensure the confidentiality of private keys, two-party signature is a viable method to avoid fraudulent key usage or key theft. Therefore, in this paper, we focus on the SM2 signature algorithm, which is standardized in GM/T 0003—2012“SM2 Elliptic Curve Public Key Cryptography”, and design a lightweight two-party SM2 signing protocol. Unlike standard secret sharing, a valid signature now is generated interactively between a client and a server, while the original key never being exposed. We mathematically prove the security of the proposed protocol. Findings from the performance evaluation of the protocol show that it achieves good performance, with a single signing operation taking 4.381ms for the client and being roughly equal to the original SM2 signature in the same testing environment.

Key words: two-party SM2 signing, mobile Internet, key protection, privacy preser-vation, secure multi-party computation

CLC Number: