Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their secu...

Full description

Saved in:
Bibliographic Details
Main Authors: Ang Yang, Junghyun Nam, Moonseong Kim, Kim-Kwang Raymond Choo
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/825984
Tags: Add Tag
No Tags, Be the first to tag this record!