A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

被引:15
|
作者
Yan Jie [1 ]
Lu Yu [1 ]
Chen Li-yun [2 ]
Nie Wei [3 ]
机构
[1] Mech Engn Coll, Equipment Command & Management Dept, Shijiazhuang 050003, Hebei, Peoples R China
[2] Mech Engn Coll, Dept Informat Engn, Shijiazhuang 050003, Hebei, Peoples R China
[3] Shenzhen Univ, Coll Informat Engn, Shenzhen 518060, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Threshold signature; SM2 elliptic curve digital signature; secret sharing; without a trusted center;
D O I
10.3837/tiis.2016.02.025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.
引用
收藏
页码:897 / 913
页数:17
相关论文
共 50 条
  • [1] Elliptic curve threshold signature scheme for blockchain
    Yu, Huifang
    Wang, Han
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [2] Non-interactive SM2 threshold signature scheme with identifiable abort
    Liang, Huiqiang
    Chen, Jianhua
    [J]. FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (01)
  • [3] Non-interactive SM2 threshold signature scheme with identifiable abort
    Huiqiang Liang
    Jianhua Chen
    [J]. Frontiers of Computer Science, 2024, 18
  • [4] A General Threshold Signature Scheme Based on Elliptic Curve
    Shang, Yulian
    Wang, Xiujuan
    Li, Yujuan
    Zhang, Yufei
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 89 - 92
  • [5] A threshold signature scheme based on the elliptic curve cryptosystem
    Chen, TS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (03) : 1119 - 1134
  • [6] Continual leakage resilient SM2 signature scheme
    Ding Yujie
    Zhang Yingnan
    Zhou Tanping
    [J]. PROCEEDINGS OF 2020 3RD INTERNATIONAL CONFERENCE ON UNMANNED SYSTEMS (ICUS), 2020, : 931 - 936
  • [7] Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm
    Peng C.
    Luo M.
    He D.
    Huang X.
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2278 - 2286
  • [8] A NEW VERIFIABLE THRESHOLD DECRYPTION SCHEME WITHOUT TRUSTED CENTER
    Feng, Xu
    Xin, Lv
    Jia, Likun
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2011, 17 (05): : 551 - 558
  • [9] A novel ElGamal type threshold signature scheme without a trusted party
    Zhang, Wenfang
    Liu, Xingyu
    He, Dake
    Wang, Xiaomin
    [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 3119 - +
  • [10] Provably secure multi-signature scheme based on the standard SM2 signature scheme
    Xiao, Yuchen
    Zhang, Lei
    Yang, Yafang
    Wu, Wei
    Ning, Jianting
    Huang, Xinyi
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89