Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (6): 39-51.doi: 10.11959/j.issn.2096-109x.2022081

• Topic: Techniques and applications of cryptography • Previous Articles     Next Articles

Two-party cooperative blind signature based on SM2

Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG   

  1. School of Cyberspace Security, Xi’an University of Posts &Telecommunications, Xi’an 710121, China
  • Revised:2022-06-22 Online:2022-12-15 Published:2023-01-16
  • Supported by:
    The National Natural Science Foundation of China(61872292);Basic Research Program of Qinghai Province(2020-ZJ-701)

Abstract:

SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.

Key words: SM2, two-party blind signature, key security, privacy protection

CLC Number: 

No Suggested Reading articles found!