Secret Sharing based SM2 Digital Signature Generation using Homomorphic Encryption

被引:1
作者
Long, Yihong [1 ]
Cheng, Minyang [1 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Peoples R China
来源
2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019) | 2019年
关键词
ECC; SM2; digital signature; secret sharing based cryptography; additively homomorphic encryption;
D O I
10.1109/CIS.2019.00060
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SM2 is an elliptic curve public key cryptography algorithm released by the State Cryptography Administration of China. It includes digital signature, data encryption and key exchange schemes. To meet specific application requirements, such as to protect the user's private key in software only implementation, and to facilitate secure cloud cryptography computing, secret sharing based SM2 signature generation schemes have been proposed in the literature. In this paper a new such kind of scheme based upon additively homomorphic encryption is proposed. The proposed scheme overcomes the drawback that the existing schemes have and is more secure. It is useful in various application scenarios.
引用
收藏
页码:252 / 256
页数:5
相关论文
共 23 条
[1]  
[Anonymous], 2012, 00032012 GMT STAT CR
[2]   An Additively Homomorphic Encryption over Large Message Space [J].
Chen, Hu ;
Hu, Yupu ;
Lian, Zhizhu ;
Jia, Huiwen ;
Wang, Xu An .
INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2015, 10 (03) :82-102
[3]  
DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
[4]   Study on Secret Sharing for SM2 Digital Signature and Its Application [J].
Ding, Fan ;
Long, Yihong ;
Wu, Peili .
2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, :205-209
[5]  
Fang XJ, 2017, 2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), P412, DOI 10.1109/INFOMAN.2017.7950418
[6]   Elliptic curve Paillier schemes [J].
Galbraith, SD .
JOURNAL OF CRYPTOLOGY, 2002, 15 (02) :129-138
[7]  
Gennaro R, 1996, LECT NOTES COMPUT SC, V1070, P354
[8]   Fully Homomorphic Encryption Using Ideal Lattices [J].
Gentry, Craig .
STOC'09: PROCEEDINGS OF THE 2009 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2009, :169-178
[9]  
Mahto Dindayal., 2018, INT J NETWORK SECURI, V20, P625
[10]   A new algorithm for a public key cryptosystem using elliptic curve [J].
Mehibel, Nissa ;
Hamadouche, M'hamed .
2017 EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS), 2017, :17-22