• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

Vol. 10, No. 2, February 28, 2016
10.3837/tiis.2016.02.025, Download Paper (Free):

Abstract

Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Y. Jie, L. Yu, C. Li-yun and N. Wei, "A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center," KSII Transactions on Internet and Information Systems, vol. 10, no. 2, pp. 897-913, 2016. DOI: 10.3837/tiis.2016.02.025.

[ACM Style]
Yan Jie, Lu Yu, Chen Li-yun, and Nie Wei. 2016. A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center. KSII Transactions on Internet and Information Systems, 10, 2, (2016), 897-913. DOI: 10.3837/tiis.2016.02.025.