Skip to main content
Log in

Secure two-party SM9 signing

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2009. http://www.bitcoin.org/bitcoin.pdf 2

    Google Scholar 

  2. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1984. 47–53

    Google Scholar 

  3. Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of Symposium on Cryptography and Information Security, 2000. 26–28

    Google Scholar 

  4. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceedings of Annual International Cryptology Conference, 2001. 213–229

    Google Scholar 

  5. Lindell Y. Fast secure two-party ECDSA signing. In: Proceedings of Annual International Cryptology Conference, 2017. 613–644

    Google Scholar 

  6. Desmedt Y, Frankel Y. Threshold cryptosystems. In: Proceedings of Conference on the Theory and Application of Cryptology, 1989. 307–315

    Google Scholar 

  7. Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Annual International Cryptology Conference, 1991. 457–469

    MATH  Google Scholar 

  8. Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 1999. 223–238

    MATH  Google Scholar 

  9. Canetti R, Lindell Y, Ostrovsky R, et al. Universally composable two-party and multi-party secure computation. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, 2002. 494–503

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haixia Xu.

Electronic supplementary material

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mu, Y., Xu, H., Li, P. et al. Secure two-party SM9 signing. Sci. China Inf. Sci. 63, 189101 (2020). https://doi.org/10.1007/s11432-018-9589-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-018-9589-x

Navigation