SM9 Digital Signature with Non-repudiation

被引:1
|
作者
Wang, Meng [1 ]
Long, Yihong [1 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan, Peoples R China
关键词
SM9; identity based cryptography; private key generation; non-repudiation; digital signature; homomorphic encryption; ENCRYPTION;
D O I
10.1109/CIS52066.2020.00082
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SM9 is an identity-based cryptography algorithm published by the State Cryptography Administration of China. With SM9, a user's private key for signing is generated by a central system called key generation center (KGC). When the owner of the private key wants to shirk responsibility by denying that the signature was generated by himself, he can claim that the operator of KGC forged the signature using the generated private key. To address this issue, in this paper, two schemes of SM9 digital signature with non-repudiation are proposed. With the proposed schemes, the user's private key for signing is collaboratively generated by two separate components, one of which is deployed in the private key service provider's site while the other is deployed in the user's site. The private key can only be calculated in the user's site with the help of homomorphic encryption. Therefore, only the user can obtain the private key and he cannot deny that the signature was generated by himself. The proposed schemes can achieve the non-repudiation of SM9 digital signature.
引用
收藏
页码:356 / 361
页数:6
相关论文
共 50 条
  • [21] Achieving non-repudiation of receipt
    Zhang, N
    Shi, Q
    [J]. COMPUTER JOURNAL, 1996, 39 (10): : 844 - 853
  • [22] Non-repudiation Analysis with LYSA
    Bruso, Mayla
    Cortesi, Agostino
    [J]. EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST, 2009, 297 : 318 - 329
  • [23] Intermediary non-repudiation protocols
    Onieva, JA
    Zhou, JY
    Carbonell, M
    Lopez, J
    [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 207 - 214
  • [24] Non-repudiation and the metaphysics of presence
    Roe, Michael
    [J]. SECURITY PROTOCOLS, 2007, 4631 : 204 - 206
  • [25] Non-repudiation in internet telephony
    Kuntze, Nicolai
    Schmidt, Andreas U.
    Hett, Christian
    [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 361 - +
  • [26] Investigation of non-repudiation protocols
    Han, YF
    [J]. INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 38 - 47
  • [27] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [28] A non-repudiation metering scheme
    Harn, L
    Lin, HY
    [J]. IEEE COMMUNICATIONS LETTERS, 2001, 5 (12) : 486 - 487
  • [29] Non-repudiation and the metaphysics of presence
    Roe, Michael
    [J]. SECURITY PROTOCOLS, 2007, 4631 : 207 - 214
  • [30] Truly Non-Repudiation Certificateless Short Signature Scheme from Bilinear Pairings
    Fan, Chun-I
    Hsu, Ruei-Hau
    Ho, Pei-Hsiu
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 969 - 982