{"title":"SM2数字签名的秘密共享及其应用研究","authors":"Fan Ding, Yihong Long, Peili Wu","doi":"10.1109/CIS2018.2018.00052","DOIUrl":null,"url":null,"abstract":"Secret sharing is commonly used to protect the user's private key. SM2 is an elliptic curve public-key cryptography algorithm released by China's State Cryptography Administration. For its unique digital signature operation, ordinary secret sharing schemes are not suitable for the case of the digital signature using the SM2 private key. To solve this problem, the product-based secret sharing scheme and the summation-based secret sharing scheme for the SM2 digital signature are proposed in this paper. The summation-based secret sharing scheme, in particular, contains ordinary secret sharing and threshold secret sharing. In addition, this work applies the above two schemes to the Android mobile terminal to protect a user's SM2 private key.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Study on Secret Sharing for SM2 Digital Signature and Its Application\",\"authors\":\"Fan Ding, Yihong Long, Peili Wu\",\"doi\":\"10.1109/CIS2018.2018.00052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Secret sharing is commonly used to protect the user's private key. SM2 is an elliptic curve public-key cryptography algorithm released by China's State Cryptography Administration. For its unique digital signature operation, ordinary secret sharing schemes are not suitable for the case of the digital signature using the SM2 private key. To solve this problem, the product-based secret sharing scheme and the summation-based secret sharing scheme for the SM2 digital signature are proposed in this paper. The summation-based secret sharing scheme, in particular, contains ordinary secret sharing and threshold secret sharing. In addition, this work applies the above two schemes to the Android mobile terminal to protect a user's SM2 private key.\",\"PeriodicalId\":185099,\"journal\":{\"name\":\"2018 14th International Conference on Computational Intelligence and Security (CIS)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 14th International Conference on Computational Intelligence and Security (CIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS2018.2018.00052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 14th International Conference on Computational Intelligence and Security (CIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS2018.2018.00052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Study on Secret Sharing for SM2 Digital Signature and Its Application
Secret sharing is commonly used to protect the user's private key. SM2 is an elliptic curve public-key cryptography algorithm released by China's State Cryptography Administration. For its unique digital signature operation, ordinary secret sharing schemes are not suitable for the case of the digital signature using the SM2 private key. To solve this problem, the product-based secret sharing scheme and the summation-based secret sharing scheme for the SM2 digital signature are proposed in this paper. The summation-based secret sharing scheme, in particular, contains ordinary secret sharing and threshold secret sharing. In addition, this work applies the above two schemes to the Android mobile terminal to protect a user's SM2 private key.