A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
Yudi ZHANG, Debiao HE, Mingwu ZHANG, Kim-Kwang Raymond CHOO
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm
Mobile devices are widely used for data access, communications and storage. However, storing a private key for signature and other cryptographic usage on a single mobile device can be challenging, due to its computational limitations. Thus, a number of (t, n) threshold secret sharing schemes designed to minimize private key from leakage have been proposed in the literature. However, existing schemes generally suffer from key reconstruction attack. In this paper, we propose an efficient and secure two-party distributed signing protocol for the SM2 signature algorithm. The latter has been mandated by the Chinese government for all electronic commerce applications. The proposed protocol separates the private key to storage on two devices and can generate a valid signature without the need to reconstruct the entire private key. We prove that our protocol is secure under nonstandard assumption. Then, we implement our protocol using MIRACL Cryptographic SDK to demonstrate that the protocol can be deployed in practice to prevent key disclosure.
SM2 signature / two-party signing / wireless environment / provable security / threshold secret sharing
[1] |
Clarke N L, Mekala A R. The application of signature recognition to transparent handwriting verification for mobile devices. Information Management & Computer Security, 2007, 15(3): 214–225
|
[2] |
Plamondon R, Pirlo G, Impedovo D. Online signature verification. Handbook of Document Image Processing and Recognition, Springer, London, 2014, 917–947
|
[3] |
Sae-Bae N,Memon N. Online signature verification on mobile devices. IEEE Transactions on Information Forensics and Security, 2014, 9(6): 933–947
|
[4] |
Lin Q, Li J, Huang Z, Chen W, Shen J. A short linearly homomorphic proxy signature scheme. IEEE Access, 2018, 6: 12966–12972
|
[5] |
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612–613
|
[6] |
Harn L. Comments on’fair (t, n) threshold secret sharing scheme’. IET Information Security, 2014, 8(6): 303–304
|
[7] |
Harn L, Fuyou M. Multilevel threshold secret sharing based on the Chinese Remainder Theorem. Information Processing Letters, 2014, 114(9): 504–509
|
[8] |
Kurihara J, Kiyomoto S, Fukushima K, Tanaka T. A new (k, n)-threshold secret sharing scheme and its extension. In: Proceedings of International Conference on Information Security. 2008, 455–470
|
[9] |
Stadler M. Publicly verifiable secret sharing. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1996, 190–199
|
[10] |
Tassa T. Hierarchical threshold secret sharing. Journal of Cryptology, 2007, 20(2): 237–264
|
[11] |
Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust threshold DSS signatures. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1996, 354–371
|
[12] |
MacKenzie P, Reiter M K. Two-party generation of DSA signatures. In: Proceedings of Annual International Cryptology Conference. 2001, 137–154
|
[13] |
Shoup V. Practical threshold signatures. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 2000, 207–220
|
[14] |
Goyal V, Pandey O, Sahai A, Waters B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. 2006, 89–98
|
[15] |
Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In: Proceedings of 2007 IEEE Symposium on Security and Privacy. 2007, 321–334
|
[16] |
Itakura K. A public-key cryptosystem suitable for digital multisignatures. NEC Research & Development, 1983, 71: 1–8
|
[17] |
Yi L, Bai G, Xiao G. Proxy multi-signature scheme: a new type of proxy signature scheme. Electronics Letters, 2000, 36(6): 527–528
|
[18] |
Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B. Sequential aggregate signatures and multisignatures without random oracles. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2006, 465–485
|
[19] |
Ristenpart T, Yilek S. The power of proofs-of-possession: securing multiparty signatures against rogue-key attacks. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2007, 228–245
|
[20] |
Cao F, Cao Z. A secure identity-based proxy multi-signature scheme. Information Sciences, 2009, 179(3): 292–302
|
[21] |
Li X, Chen K. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings. Applied Mathematics and Computation, 2005, 169(1): 437–450
|
[22] |
Park J M, Chong E K, Siegel H J. Constructing fair-exchange protocols for E-commerce via distributed computation of RSA signatures. In: Proceedings of the 22nd Annual Symposium on Principles of Distributed Computing. 2003, 172–181
|
[23] |
Boldyreva A. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme. In: Proceedings of International Workshop on Public Key Cryptography. 2003, 31–46
|
[24] |
Obi O O. Security issues in mobile ad-hoc networks: a survey. The 17th White House Papers Graduate Research In Informatics at Sussex, 2004
|
[25] |
Beimel A. Secret-sharing schemes: a survey. In: Proceedings of International Conference on Coding and Cryptology. 2011, 11–46
|
[26] |
Alam M K. An approach secret sharing algorithm in cloud computing security over single to multi clouds. CiteSeer, 2013
|
[27] |
Tassa T. Hierarchical threshold secret sharing. Journal of Cryptology, 2007, 20(2): 237–264
|
[28] |
Hazay C, Lindell Y. Efficient Secure Two-party Protocols: Techniques and Constructions. Springer Science & Business Media, 2010
|
[29] |
Hazay C, Mikkelsen G L, Rabin T, Toft T. Efficient RSA key generation and threshold paillier in the two-party setting. In: Proceedings of Cryptographers’ Track at the RSA Conference. 2012, 313–331
|
[30] |
Lindell Y. Fast secure two-party ECDSA signing. In: Proceedings of Annual International Cryptology Conference. 2017, 613–644
|
[31] |
Schnorr C P. Efficient signature generation by smart cards. Journal of Cryptology, 1991, 4(3): 161–174
|
[32] |
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. 1999, 223–238
|
/
〈 | 〉 |