Unbalancing Computations for SM2 Key Exchange Protocols

被引:0
|
作者
Zhao, Chenxi [1 ]
Zhang, Jie [1 ]
Huang, Xin [2 ]
机构
[1] Xian Jiaotong Liverpool Univ, Sch Adv Technol, Suzhou 215123, Peoples R China
[2] Suzhou Blocks Informat Technol Co Ltd, Suzhou, Peoples R China
关键词
Authenticated Key Exchange; Elliptic Curve Diffie-Helman; Lightweight Security Protocol; Internet of Things Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM2 is a national ecliptic curve public key algorithm standard promulgated by the State Cryptography Administration (SCA) of China. It contains an authenticated key exchange (AKE) protocol which can establish shared secret keys for two communicating parties. However, the computational burden is generally too heavy for capability-limited devices in Internet of Things (IoT). This paper alleviates its computational burden on limited devices by transferring some time-consuming operations from a limited device to its more powerful communicating partner. Two computationally unbalanced protocols are designed. Compared with the original protocols, the computationally unbalanced protocols are more friendly to limited devices.
引用
下载
收藏
页码:335 / 341
页数:7
相关论文
共 50 条
  • [31] Post-quantum key exchange Protocols
    Li, Xiangdong
    Leung, Lin
    Kwan, Andis Chi-Tung
    Zhang, Xiaowen
    Kahanda, Dammika
    Anshel, Michael
    QUANTUM INFORMATION AND COMPUTATION IV, 2006, 6244
  • [32] Key exchange protocols for multiparty communication services
    Hosei University (Institute of Electrical and Electronics Engineers Inc., United States):
  • [33] Key exchange protocols for multiparty communication services
    Chan, CW
    Chang, CC
    FIRST INTERNATIONAL SYMPOSIUM ON CYBER WORLDS, PROCEEDINGS, 2002, : 241 - 248
  • [34] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [35] SEVERAL PRACTICAL PROTOCOLS FOR AUTHENTICATION AND KEY EXCHANGE
    LIM, CH
    LEE, PJ
    INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 91 - 96
  • [36] A complete characterization of a family of key exchange protocols
    Takaaki Mizuki
    Hiroki Shizuya
    Takao Nishizeki
    International Journal of Information Security, 2002, 1 (2) : 131 - 142
  • [37] Security Verification for Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
  • [38] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [39] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [40] Arterial expression of the SM1/SM2 myosin heavy chain isoforms
    Sherwood, JJ
    Eddinger, TJ
    BIOPHYSICAL JOURNAL, 2001, 80 (01) : 388A - 388A