Unbalancing Computations for SM2 Key Exchange Protocols

被引:0
|
作者
Zhao, Chenxi [1 ]
Zhang, Jie [1 ]
Huang, Xin [2 ]
机构
[1] Xian Jiaotong Liverpool Univ, Sch Adv Technol, Suzhou 215123, Peoples R China
[2] Suzhou Blocks Informat Technol Co Ltd, Suzhou, Peoples R China
关键词
Authenticated Key Exchange; Elliptic Curve Diffie-Helman; Lightweight Security Protocol; Internet of Things Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM2 is a national ecliptic curve public key algorithm standard promulgated by the State Cryptography Administration (SCA) of China. It contains an authenticated key exchange (AKE) protocol which can establish shared secret keys for two communicating parties. However, the computational burden is generally too heavy for capability-limited devices in Internet of Things (IoT). This paper alleviates its computational burden on limited devices by transferring some time-consuming operations from a limited device to its more powerful communicating partner. Two computationally unbalanced protocols are designed. Compared with the original protocols, the computationally unbalanced protocols are more friendly to limited devices.
引用
下载
收藏
页码:335 / 341
页数:7
相关论文
共 50 条
  • [1] Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
    Yang, Ang
    Nam, Junghyun
    Kim, Moonseong
    Choo, Kim-Kwang Raymond
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [2] Comments on the SM2 Key Exchange Protocol
    Xu, Jing
    Feng, Dengguo
    CRYPTOLOGY AND NETWORK SECURITY, 2011, 7092 : 160 - 171
  • [3] Partially known information attack on SM2 key exchange protocol
    Wei WEI
    Jiazhe CHEN
    Dan LI
    Beibei WANG
    Science China(Information Sciences), 2019, 62 (03) : 61 - 74
  • [4] Partially known information attack on SM2 key exchange protocol
    Wei Wei
    Jiazhe Chen
    Dan Li
    Beibei Wang
    Science China Information Sciences, 2019, 62
  • [5] Partially known information attack on SM2 key exchange protocol
    Wei, Wei
    Chen, Jiazhe
    Li, Dan
    Wang, Beibei
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)
  • [6] Security analysis of SM2 key exchange protocol in TPM2.0
    Zhao, Shijun
    Xi, Li
    Zhang, Qianying
    Qin, Yu
    Feng, Dengguo
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (03) : 383 - 395
  • [7] Efficient Range Proof Protocols Based on Chinese Cryptographic SM2
    Lin C.
    Huang X.-Y.
    He D.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (01): : 148 - 159
  • [8] Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
    Zhang, Jie
    Huang, Xin
    Wang, Wei
    Yue, Yong
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) : 878 - 890
  • [9] Security on SM2 and GOST Signatures against Related Key Attacks
    Cui, Handong
    Qin, Xianrui
    Cai, Cailing
    Yuen, Tsz Hon
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 155 - 163
  • [10] Security analysis of two unbalancing pairing-free identity-based authenticated key exchange protocols
    Cheng, Qingfeng
    Li, Yuting
    Jiang, Qi
    Li, Xiong
    International Journal of Network Security, 2020, 22 (04): : 597 - 601