Anonymous Credential Protocol Based on SM2 Digital Signature

被引:0
|
作者
Zhao, Yan-Qi [1 ]
Yang, Xiao-Yi [2 ]
Feng, Qi [3 ]
Yu, Yong [4 ]
机构
[1] School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an,710121, China
[2] Department of Computing, The Hong Kong Polytechnic University, Hong Kong,999077, Hong Kong
[3] School of Cyber Science and Engineering, Wuhan University, Wuhan,430040, China
[4] School of Computer Science, Shaanxi Normal University, Xi’an,710119, China
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 07期
关键词
D O I
10.13328/j.cnki.jos.006929
中图分类号
学科分类号
摘要
引用
收藏
页码:3469 / 3481
相关论文
共 50 条
  • [31] A two-party SM2 signing Protocol and its application
    Su Y.-X.
    Tian H.-B.
    [J]. Tian, Hai-Bo (tianhb@mail.sysu.edu.cn), 1600, Science Press (43): : 701 - 710
  • [32] Partially known information attack on SM2 key exchange protocol
    Wei Wei
    Jiazhe Chen
    Dan Li
    Beibei Wang
    [J]. Science China Information Sciences, 2019, 62
  • [33] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    [J]. Science China(Information Sciences), 2019, 62 (03) : 61 - 74
  • [34] Partially Known Nonces and Fault Injection Attacks on SM2 Signature Algorithm
    Liu, Mingjie
    Chen, Jiazhe
    Li, Hexin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 343 - 358
  • [35] Non-interactive SM2 threshold signature scheme with identifiable abort
    Huiqiang Liang
    Jianhua Chen
    [J]. Frontiers of Computer Science, 2024, 18
  • [36] Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks
    Zhang, Zhenfeng
    Yang, Kang
    Zhang, Jiang
    Chen, Cheng
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 140 - 153
  • [37] A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
    Qian, Wenfei
    Wang, Pingjian
    Lei, Lingguang
    Chen, Tianyu
    Zhang, Bikuan
    [J]. 2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 818 - 824
  • [38] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [39] A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center
    Yan Jie
    Lu Yu
    Chen Li-yun
    Nie Wei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (02): : 897 - 913
  • [40] Security analysis of SM2 key exchange protocol in TPM2.0
    Zhao, Shijun
    Xi, Li
    Zhang, Qianying
    Qin, Yu
    Feng, Dengguo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 383 - 395