• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Peng Cong, Luo Min, He Debiao, Huang Xinyi. Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm[J]. Journal of Computer Research and Development, 2021, 58(10): 2278-2286. DOI: 10.7544/issn1000-1239.2021.20210645
Citation: Peng Cong, Luo Min, He Debiao, Huang Xinyi. Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm[J]. Journal of Computer Research and Development, 2021, 58(10): 2278-2286. DOI: 10.7544/issn1000-1239.2021.20210645

Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm

Funds: This work was supported by the National Natural Science Foundation of China (61972294, 61932016, 62032005), the Key Research and Development Program of Shandong Province (2020CXGC010107), the Special Project on Science and Technology Program of Hubei Provience (2020AEA013), the Natural Science Foundation of Hubei Province (2020CFA052), and the Science and Technology Project of Wuhan Municipal (2020010601012187).
More Information
  • Published Date: September 30, 2021
  • The adaptor signature scheme is an extension of the standard digital signature, which can create a “pre-signature” that implies the state of a hard relation (such as discrete logarithm problems) and can be transformed into a completed signature by the witness of the hard relation. The completed signature can be verified by the verification algorithm of a standard signature scheme. Intuitively, an adaptor signature has two properties: 1)only users who know the witness can transform the pre-signature into a completed signature; 2)any user may extract the witness through a pre-signature and a completed signature. Thus, the adaptor signature scheme can provide the atomic exchange property in the blockchain, and has been proved to be very widely used in practice. Based on the SM2 digital signature algorithm, a new adaptor signature scheme (SM2-AS) is constructed in this paper. This scheme can effectively match the SM2 signature scheme’s key generation, signature generation and signature verification algorithms. Moreover, under the random oracle model, we prove that the SM2-AS scheme is secure, that is, it satisfies the pre-signature correctness, pre-signature adaptability, existential unforgeability under chosen plaintext attacks, and witness extractability. Through theoretical analysis and experimental test, the performance of the SM2-AS scheme is comparable to that of ECDSA-based adaptor signature scheme, but obviously weaker than that of the Schnorr-based adaptor signature scheme.
  • Related Articles

    [1]Li Zhenyu, Ding Yong, Yi Chen, Liang Hai. A Blockchain Data Acceleration Exchange Method for Data Element Circulation[J]. Journal of Computer Research and Development, 2024, 61(10): 2554-2569. DOI: 10.7544/issn1000-1239.202440367
    [2]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [3]Yu Tingting, Li Chao, Wang Boxiang, Chen Rui, Jiang Yunsong. Atomicity Violation Detection for Interrupt-Driven Aerospace Embedded Software[J]. Journal of Computer Research and Development, 2023, 60(2): 294-310. DOI: 10.7544/issn1000-1239.202220908
    [4]Chen Ming. A Composable Authentication Key Exchange Scheme with Post-Quantum Forward Secrecy[J]. Journal of Computer Research and Development, 2020, 57(10): 2158-2176. DOI: 10.7544/issn1000-1239.2020.20200472
    [5]Feng Qi, He Debiao, Luo Min, Li Li. Efficient Two-Party SM2 Signing Protocol for Mobile Internet[J]. Journal of Computer Research and Development, 2020, 57(10): 2136-2146. DOI: 10.7544/issn1000-1239.2020.20200401
    [6]Yang Xiaoyan, Hou Mengbo, Wei Xiaochao. Verifier-Based Three-Party Password Authenticated Key Exchange Protocol[J]. Journal of Computer Research and Development, 2016, 53(10): 2230-2238. DOI: 10.7544/issn1000-1239.2016.20160463
    [7]Han Xiaowei, Wu Liji, Wang Beibei, Wang An. Atomic Algorithm Against Simple Power Attack of SM2[J]. Journal of Computer Research and Development, 2016, 53(8): 1850-1856. DOI: 10.7544/issn1000-1239.2016.20150052
    [8]Wen Weiqiang, Wang Libin. A Strongly Secure Lattice-Based Key Exchange Protocol[J]. Journal of Computer Research and Development, 2015, 52(10): 2258-2269. DOI: 10.7544/issn1000-1239.2015.20150518
    [9]Zhang Junwei, Ma Zhuo, Ma Jianfeng, and Ji Wenjiang. UC Security Model of Position-Based Key Exchange[J]. Journal of Computer Research and Development, 2014, 51(2): 353-359.
    [10]Sun Yu, Han Qingtong, and Liu Jianwei. Design of Key Exchange Protocol Based on Short Group Signature[J]. Journal of Computer Research and Development, 2012, 49(12): 2619-2622.
  • Cited by

    Periodical cited type(13)

    1. 涂彬彬,陈宇. 支持批量证明的SM2适配器签名及其分布式扩展. 软件学报. 2024(05): 2566-2582 .
    2. 胡小明,陈海婵. 可证明安全的SM2盲适配器签名方案. 网络与信息安全学报. 2024(02): 59-68 .
    3. 唐锴令,郑皓. 融合DES和ECC算法的物联网隐私数据加密方法. 吉林大学学报(信息科学版). 2024(03): 496-502 .
    4. 薛庆水,卢子譞,马海峰,高永福,谈成龙,孙晨曦. 基于SM2的强前向安全性两方共同签名方案. 计算机工程与设计. 2024(08): 2290-2297 .
    5. 张艳硕,刘宁,袁煜淇,杨亚涛. 基于ISRSAC数字签名算法的适配器签名方案. 通信学报. 2023(03): 178-185 .
    6. 陈海婵,郭智浩,王俊以,胡小明. 基于适配器签名和盲混技术的电子资源交易方案设计与实现. 上海第二工业大学学报. 2023(01): 53-60 .
    7. 韦薇,罗敏,白野,彭聪,何德彪. 基于SIMD指令集的SM2数字签名算法快速实现. 密码学报. 2023(04): 720-736 .
    8. 白野,何德彪,罗敏,杨智超,彭聪. 一种针对SM2数字签名算法的攻击方案. 密码学报. 2023(04): 823-835 .
    9. 夏再琦,王祥,白鹏飞,易玲,郭艳鹏,宋绍华. 智能终端的Uboot引导应用程序实现方法. 单片机与嵌入式系统应用. 2023(10): 57-60 .
    10. 刘捷. 基于鸿蒙的新一代智能POS业务软件设计. 电子元器件与信息技术. 2023(12): 32-35 .
    11. 苏簪铀,马振华,王志洋. 基于协同签名的电网移动GIS签名系统的设计与实现. 农村电气化. 2022(04): 50-53 .
    12. 王子瑞,张驰,魏凌波. 基于双线性配对的适配器签名方案. 密码学报. 2022(04): 686-697 .
    13. 李松钊,梁晓芳,李文敬. 基于零知识验证签名的食品供应链追溯算法研究. 南宁师范大学学报(自然科学版). 2022(04): 49-56 .

    Other cited types(10)

Catalog

    Article views (852) PDF downloads (482) Cited by(23)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return