Anonymous Credential Protocol Based on SM2 Digital Signature

被引:0
|
作者
Zhao, Yan-Qi [1 ]
Yang, Xiao-Yi [2 ]
Feng, Qi [3 ]
Yu, Yong [4 ]
机构
[1] School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an,710121, China
[2] Department of Computing, The Hong Kong Polytechnic University, Hong Kong,999077, Hong Kong
[3] School of Cyber Science and Engineering, Wuhan University, Wuhan,430040, China
[4] School of Computer Science, Shaanxi Normal University, Xi’an,710119, China
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 07期
关键词
D O I
10.13328/j.cnki.jos.006929
中图分类号
学科分类号
摘要
引用
收藏
页码:3469 / 3481
相关论文
共 50 条
  • [1] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [2] Secure Multi-party SM2 Signature Based on SPDZ Protocol
    Li, Xiaotong
    Wang, Hao
    Chen, Jiyang
    Li, Shikuan
    Sun, Yuxiang
    Su, Ye
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 85 - 103
  • [3] Secret Sharing based SM2 Digital Signature Generation using Homomorphic Encryption
    Long, Yihong
    Cheng, Minyang
    [J]. 2019 15TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2019), 2019, : 252 - 256
  • [4] Study on Secret Sharing for SM2 Digital Signature and Its Application
    Ding, Fan
    Long, Yihong
    Wu, Peili
    [J]. 2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2018, : 205 - 209
  • [5] Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles
    Yang, Mei
    Liu, Chong
    Li, Huiyun
    Shao, Cuiping
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 890 - 896
  • [6] An Efficient Scheme for Implementation of SM2 Digital Signature over GF(p)
    Liu, Yanhua
    Guo, Wei
    Tan, Ya
    Wei, Jizeng
    Sun, Dazhi
    [J]. CONTEMPORARY RESEARCH ON E-BUSINESS TECHNOLOGY AND STRATEGY, 2012, 332 : 250 - 258
  • [7] Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features
    Mai, Long
    Yan, Yuan
    Jia, Songlin
    Wang, Shuran
    Wang, Jianqiang
    Li, Juanru
    Ma, Siqi
    Gu, Dawu
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 430 - 446
  • [8] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Zhang, Yongxin
    Lei, Hong
    Wang, Bin
    Wang, Qinghao
    Lu, Ning
    Shi, Wenbo
    Chen, Bangdao
    Yue, Qiuling
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [9] Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme
    Yongxin Zhang
    Hong Lei
    Bin Wang
    Qinghao Wang
    Ning Lu
    Wenbo Shi
    Bangdao Chen
    Qiuling Yue
    [J]. Frontiers of Computer Science, 2024, 18
  • [10] A High Throughput SM2 Digital Signature Computing Scheme Based on Graphics Processing Unit Platform
    Zhu Hui
    Huang Yukun
    Wang Fengwei
    Yang Xiaopeng
    Li Hui
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4274 - 4283