Secure and efficient two-party collaborative SM9 signature scheme suitable for smart home

被引:7
|
作者
Liu, Shuang Gen [1 ]
Liu, Ru [1 ]
Rao, Si Yuan [1 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Cyberspace Secur, Xian 710121, Peoples R China
关键词
Smart home; SM9  algorithm; Two-party collaborative signature; Random oracle model; Provable security;
D O I
10.1016/j.jksuci.2022.05.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart home usually has poor security and is vulnerable to attack since it adopts embedded proces-sors that are limited by volume and power consumption. To improve the communication security of the smart home system, identity-based signature schemes are widely used in wireless network communica-tions. However, the user's signature private key is generally stored in a single device, it is easy to be stolen by attackers to control the smart home devices. To reduce the risk of leakage of the signature private key, a two-party collaborative signature scheme based on the SM9 algorithm is proposed in this paper. The user's signature private key is generated through the collaboration of the two-party key generation center (KGC), and the integer secrets related to the signature private key are stored in two devices respectively. During the signing process, the two devices sign collaboratively to prevent the complete private key from being leaked. The security of the scheme is proved in the random oracle model. Theoretical analysis and experimental results show that our proposed scheme can achieve higher security with lower computa-tion cost and communication cost when compared with the existing two-party SM9 signature schemes.(c) 2022 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:4022 / 4030
页数:9
相关论文
共 50 条
  • [41] An efficient protocol for secure two-party computation in the presence of malicious adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
  • [42] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
    Lindell, Yehuda
    Pinkas, Benny
    [J]. JOURNAL OF CRYPTOLOGY, 2015, 28 (02) : 312 - 350
  • [43] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
  • [44] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [45] MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions
    Frederiksen, Tore Kasper
    Jakobsen, Thomas Pelle
    Nielsen, Jesper Buus
    Nordholt, Peter Sebastian
    Orlandi, Claudio
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 537 - 556
  • [46] Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation
    Bingren Chen
    Wei Yang
    Liusheng Huang
    [J]. Quantum Information Processing, 2019, 18
  • [47] Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography
    He, Debiao
    Zhang, Yudi
    Wang, Ding
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) : 1124 - 1132
  • [48] Aitps: A Two-Party Signature Scheme from Asymmetry Module Lattice Problems
    Wen J.
    Wang H.
    Liu J.
    Zhang H.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (09): : 2137 - 2151
  • [49] Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation
    Chen, Bingren
    Yang, Wei
    Huang, Liusheng
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (01)
  • [50] Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency
    Feng, Qi
    He, Debiao
    Luo, Min
    Li, Zengxiang
    Choo, Kim-Kwang Raymond
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 137 - 147