SM9 Digital Signature with Non-repudiation

被引:1
|
作者
Wang, Meng [1 ]
Long, Yihong [1 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan, Peoples R China
关键词
SM9; identity based cryptography; private key generation; non-repudiation; digital signature; homomorphic encryption; ENCRYPTION;
D O I
10.1109/CIS52066.2020.00082
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
SM9 is an identity-based cryptography algorithm published by the State Cryptography Administration of China. With SM9, a user's private key for signing is generated by a central system called key generation center (KGC). When the owner of the private key wants to shirk responsibility by denying that the signature was generated by himself, he can claim that the operator of KGC forged the signature using the generated private key. To address this issue, in this paper, two schemes of SM9 digital signature with non-repudiation are proposed. With the proposed schemes, the user's private key for signing is collaboratively generated by two separate components, one of which is deployed in the private key service provider's site while the other is deployed in the user's site. The private key can only be calculated in the user's site with the help of homomorphic encryption. Therefore, only the user can obtain the private key and he cannot deny that the signature was generated by himself. The proposed schemes can achieve the non-repudiation of SM9 digital signature.
引用
收藏
页码:356 / 361
页数:6
相关论文
共 50 条
  • [31] A key authentication scheme with non-repudiation
    Hwang, Min-Shiang
    Li, Li-Hua
    Lee, Cheng-Chi
    [J]. Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78
  • [32] Some guidelines for non-repudiation protocols
    Louridas, P
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2000, 30 (05) : 29 - 38
  • [33] Anonymous fingerprinting with direct non-repudiation
    Pfitzmann, B
    Sadeghi, AR
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 401 - 414
  • [34] Non-repudiation protocols for multiple entities
    Onieva, JA
    Zhou, JY
    Lopez, J
    [J]. COMPUTER COMMUNICATIONS, 2004, 27 (16) : 1608 - 1616
  • [35] Non-repudiation oblivious watermarking schema for secure digital video distribution
    Zhou, WS
    Rockwood, T
    Sagetong, P
    [J]. PROCEEDINGS OF THE 2002 IEEE WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2002, : 343 - 346
  • [36] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [37] Signcryption with non-interactive non-repudiation
    Malone-Lee, J
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 81 - 109
  • [38] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [39] A MUTUAL NON-REPUDIATION PROTOCOL WITH PRIVACY
    蒋晓宁
    叶澄清
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2000, (03) : 80 - 84
  • [40] Formal analysis of a non-repudiation protocol
    Schneider, S
    [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 54 - 65