Skip to main content
Top
Published in:
Cover of the book

2019 | OriginalPaper | Chapter

Security Analysis of SM9 Key Agreement and Encryption

Author : Zhaohui Cheng

Published in: Information Security and Cryptology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

SM9 is a Chinese cryptography standard that defines a set of identity-based cryptographic schemes from pairings. Although the SM9 key agreement protocol and the SM9 encryption scheme have been used for years, there is no public available security analysis of these two schemes. In this paper, we formally analyze the security of these two schemes in the random oracle model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21, 178–199 (2008)MathSciNetCrossRef Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21, 178–199 (2008)MathSciNetCrossRef
6.
go back to reference Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\psi \) revisited. Discret. Appl. Math. 159, 1311–1322 (2011)MathSciNetCrossRef Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\psi \) revisited. Discret. Appl. Math. 159, 1311–1322 (2011)MathSciNetCrossRef
8.
go back to reference Chen, L., Cheng, Z., Smart, N.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)CrossRef Chen, L., Cheng, Z., Smart, N.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)CrossRef
9.
go back to reference Cheng, Z., Chen, L.: On security proof of McCullagh-Barreto’s key agreement protocol and its variants. Int. J. Secur. Netw. 2, 251–259 (2007). Special Issue on Cryptography in NetworksCrossRef Cheng, Z., Chen, L.: On security proof of McCullagh-Barreto’s key agreement protocol and its variants. Int. J. Secur. Netw. 2, 251–259 (2007). Special Issue on Cryptography in NetworksCrossRef
10.
go back to reference Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33, 167–226 (2003)MathSciNetCrossRef Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33, 167–226 (2003)MathSciNetCrossRef
11.
go back to reference Galbraith, S., Hess, F., Vercauteren, F.: Aspects of pairing inversion. IEEE Trans. Inf. Theory 54(12), 5719–5728 (2008)MathSciNetCrossRef Galbraith, S., Hess, F., Vercauteren, F.: Aspects of pairing inversion. IEEE Trans. Inf. Theory 54(12), 5719–5728 (2008)MathSciNetCrossRef
12.
go back to reference Galbraith, S., Paterson, K., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156, 3113–3121 (2008)MathSciNetCrossRef Galbraith, S., Paterson, K., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156, 3113–3121 (2008)MathSciNetCrossRef
13.
go back to reference GM/T 0044–2016. Identity-based cryptographic algorithms SM9 (2016) GM/T 0044–2016. Identity-based cryptographic algorithms SM9 (2016)
14.
go back to reference ISO/IEC. Information technology - Secruity techniques - Key management - Part 3: Mechanisms using asymmetric techniques. ISO/IEC 11770–3:2015 ISO/IEC. Information technology - Secruity techniques - Key management - Part 3: Mechanisms using asymmetric techniques. ISO/IEC 11770–3:2015
15.
go back to reference ISO/IEC. Information technology - Secruity techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms. ISO/IEC 14888–3:2018 ISO/IEC. Information technology - Secruity techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms. ISO/IEC 14888–3:2018
16.
go back to reference ISO/IEC. Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation. ISO/IEC 15946–5:2009 ISO/IEC. Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation. ISO/IEC 15946–5:2009
17.
go back to reference ISO/IEC. Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO/IEC 18033–2:2006 ISO/IEC. Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO/IEC 18033–2:2006
18.
go back to reference ISO/IEC. Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers. ISO/IEC 18033–5:2015 ISO/IEC. Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers. ISO/IEC 18033–5:2015
19.
go back to reference Lee, E., Lee, H., Park, C.: Efficient and generalized pairing computation on abelian varieties. IEEE Trans. Inf. Theory 55, 1793–1803 (2009)MathSciNetCrossRef Lee, E., Lee, H., Park, C.: Efficient and generalized pairing computation on abelian varieties. IEEE Trans. Inf. Theory 55, 1793–1803 (2009)MathSciNetCrossRef
Metadata
Title
Security Analysis of SM9 Key Agreement and Encryption
Author
Zhaohui Cheng
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_1

Premium Partner