Skip to main content
Top
Published in:

2019 | OriginalPaper | Chapter

Security Analysis of SM9 Key Agreement and Encryption

Author : Zhaohui Cheng

Published in: Information Security and Cryptology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

SM9 is a Chinese cryptography standard that defines a set of identity-based cryptographic schemes from pairings. Although the SM9 key agreement protocol and the SM9 encryption scheme have been used for years, there is no public available security analysis of these two schemes. In this paper, we formally analyze the security of these two schemes in the random oracle model.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
  1. Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994). https://​doi.​org/​10.​1007/​3-540-48329-2_​21View Article
  2. Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.P.: Generic constructions of identity-based and certificateless KEMs. J. Cryptol. 21, 178–199 (2008)MathSciNetView Article
  3. Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997). https://​doi.​org/​10.​1007/​BFb0024447View ArticleMATH
  4. Boneh, D., Boyen, X.: Efficient Selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004). https://​doi.​org/​10.​1007/​978-3-540-24676-3_​14View Article
  5. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). https://​doi.​org/​10.​1007/​3-540-44647-8_​13View Article
  6. Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings - the role of \(\psi \) revisited. Discret. Appl. Math. 159, 1311–1322 (2011)MathSciNetView Article
  7. Chen, L., Cheng, Z.: Security proof of Sakai-Kasahara’s identity-based encryption scheme. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 442–459. Springer, Heidelberg (2005). https://​doi.​org/​10.​1007/​11586821_​29View Article
  8. Chen, L., Cheng, Z., Smart, N.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)View Article
  9. Cheng, Z., Chen, L.: On security proof of McCullagh-Barreto’s key agreement protocol and its variants. Int. J. Secur. Netw. 2, 251–259 (2007). Special Issue on Cryptography in NetworksView Article
  10. Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33, 167–226 (2003)MathSciNetView Article
  11. Galbraith, S., Hess, F., Vercauteren, F.: Aspects of pairing inversion. IEEE Trans. Inf. Theory 54(12), 5719–5728 (2008)MathSciNetView Article
  12. Galbraith, S., Paterson, K., Smart, N.P.: Pairings for cryptographers. Discret. Appl. Math. 156, 3113–3121 (2008)MathSciNetView Article
  13. GM/T 0044–2016. Identity-based cryptographic algorithms SM9 (2016)
  14. ISO/IEC. Information technology - Secruity techniques - Key management - Part 3: Mechanisms using asymmetric techniques. ISO/IEC 11770–3:2015
  15. ISO/IEC. Information technology - Secruity techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms. ISO/IEC 14888–3:2018
  16. ISO/IEC. Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation. ISO/IEC 15946–5:2009
  17. ISO/IEC. Information technology - Security techniques - Encryption algorithms - Part 2: Asymmetric ciphers. ISO/IEC 18033–2:2006
  18. ISO/IEC. Information technology - Security techniques - Encryption algorithms - Part 5: Identity-based ciphers. ISO/IEC 18033–5:2015
  19. Lee, E., Lee, H., Park, C.: Efficient and generalized pairing computation on abelian varieties. IEEE Trans. Inf. Theory 55, 1793–1803 (2009)MathSciNetView Article
  20. Vercauteren, F.: Optimal pairings. IEEE Trans. Inf. Theory 56(11), 455–461 (2010)MathSciNetView Article
Metadata
Title
Security Analysis of SM9 Key Agreement and Encryption
Author
Zhaohui Cheng
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_1

Premium Partner