Unbalancing Computations for SM2 Key Exchange Protocols

被引:0
|
作者
Zhao, Chenxi [1 ]
Zhang, Jie [1 ]
Huang, Xin [2 ]
机构
[1] Xian Jiaotong Liverpool Univ, Sch Adv Technol, Suzhou 215123, Peoples R China
[2] Suzhou Blocks Informat Technol Co Ltd, Suzhou, Peoples R China
关键词
Authenticated Key Exchange; Elliptic Curve Diffie-Helman; Lightweight Security Protocol; Internet of Things Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM2 is a national ecliptic curve public key algorithm standard promulgated by the State Cryptography Administration (SCA) of China. It contains an authenticated key exchange (AKE) protocol which can establish shared secret keys for two communicating parties. However, the computational burden is generally too heavy for capability-limited devices in Internet of Things (IoT). This paper alleviates its computational burden on limited devices by transferring some time-consuming operations from a limited device to its more powerful communicating partner. Two computationally unbalanced protocols are designed. Compared with the original protocols, the computationally unbalanced protocols are more friendly to limited devices.
引用
下载
收藏
页码:335 / 341
页数:7
相关论文
共 50 条
  • [41] MAGNETIC-PROPERTIES OF SM2(CO1-XMNX)14B, SM2(CO1XFEX)14B, SM2(CO1-XNI)14B
    MARUYAMA, F
    ICHINOSE, K
    FUJIWARA, K
    MISAWA, M
    OYASATO, M
    NAGAI, H
    TSUJIMURA, A
    JOURNAL OF MAGNETISM AND MAGNETIC MATERIALS, 1990, 90-1 : 552 - 554
  • [42] Anonymous Credential Protocol Based on SM2 Digital Signature
    Zhao Y.-Q.
    Yang X.-Y.
    Feng Q.
    Yu Y.
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (07): : 3469 - 3481
  • [43] Fabric Blockchain Design Based on Improved SM2 Algorithm
    Fu, Jinhua
    Zhou, Wenhui
    Zhang, Suzhi
    INTERNATIONAL JOURNAL ON SEMANTIC WEB AND INFORMATION SYSTEMS, 2023, 19 (01)
  • [45] High-Performance Implementation of SM2 Based on FPGA
    Zhang, Dan
    Bai, Guoqiang
    PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016), 2016, : 718 - 722
  • [46] 基于SM2的高效签密方案
    张宇
    汪宗斌
    秦体红
    信息安全研究, 2024, 10 (06) : 526 - 531
  • [47] 基于SM2的可穿刺签名方案
    周权
    谢淑婷
    曾志康
    陈丽丽
    卢子冲
    广州大学学报(自然科学版), 2025, 24 (01) : 1 - 8
  • [48] ID2S Password-Authenticated Key Exchange Protocols
    Yi, Xun
    Rao, Fang-Yu
    Tari, Zahir
    Hao, Feng
    Bertino, Elisa
    Khalil, Ibrahim
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (12) : 3687 - 3701
  • [49] Group key exchange protocols withstanding ephemeral-key reveals
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel Luis
    Suarez Corona, Adriana
    IET INFORMATION SECURITY, 2018, 12 (01) : 79 - 86
  • [50] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24