请输入您要查询的百科知识:

 

词条 SM9 (cryptography standard)
释义

  1. Identity Based Cryptography

  2. Chinese Cryptographic Standards

  3. SM9 Identity Based Signature Algorithm

  4. SM9 Identity Based Key Encapsulation

  5. SM9 Identity Based Key Agreement

  6. Implementations of SM9

  7. Further Information

  8. References

SM9 is a Chinese national cryptography standard for Identity Based Cryptography issued by the Chinese State Cryptographic Authority in March 2016.[1]  It is Chinese Standard GM/T0044-2016 SM9. The standard contains 3 cryptographic algorithms:

-  An Identity Based Digital Signature Algorithm which allows one entity to digitally sign a message which can be verified by another entity.-  An Identity Based Key Agreement Algorithm which requires the participation of two entities in the creation of a key.-  An Identity Based Key Encapsulation Algorithm which allows one entity to securely send a symmetric key to another entity. 

Identity Based Cryptography

Identity Based Cryptography is a type of public key cryptography that uses a widely known representation of an entity's Identity (name, email address, phone number etc) as the entities public key. This eliminates the need to have a separate public key bound by some mechanism (such as a digitally signed public key certificate) to the Identity of an entity. In Identity Based Cryptography (IBC) the public key is often taken as the concatenation of an entity's Identity and a validity period for the public key.

In Identity Based Cryptography, one or more trusted agent's use their private keys to compute an entity's private key from their public key (Identity and Validity Period). The corresponding public keys of the trusted agent or agents are known to everyone using the network. If only one trusted agent is used that trusted agent can compute all the private keys for users in the network. To avoid that state, some researchers propose using multiple trusted agents in such a way that more than one of them need to be compromised in order to compute individual public keys.

Chinese Cryptographic Standards

The SM9 Standard adopted in 2016 is one of a number of Chinese national cryptography standards. Other publicly available Chinese cryptographic standards are:

SM2 - an Elliptic Curve Diffie-Hellman key agreement and signature using a specified 256-bit elliptic curve. GM/T 0003.1: SM2 (published in 2010)[2]

SM3 - a 256-bit cryptographic hash function. GM/T 0004.1-2012: SM3 (published in 2010)[2]SM4 - a 128-bit block cipher with a 128-bit key. GM/T 0002-2012: SM4 (published in 2012)[2]

The SM9 standard along with these other standards are issued by the Chinese State Cryptographic Authority. The first part of the standard [https://github.com/guanzhi/GM-Standards/blob/master/%E5%85%AC%E5%BC%80%E6%96%87%E6%A1%A3/sm9-1.pdf SM9-1] provides and overvew of the standard.[2]

SM9 Identity Based Signature Algorithm

The Identity Based Signature Algorithm in SM9 traces its origins to an Identity Based Signature Algorithm published at Asiacrypt 2005 in the paper: "Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps" by Barreto, Libert, McCullagh, and Quisquater.[3] It was standardized in IEEE 1363.3 and in ISO/IEC 14888-3:2015.[4][5]

SM9 Identity Based Key Encapsulation

The Identity Based Key Encapsulation Algorithm in SM9 traces its origins to a 2003 paper by Sakai and Kasahara titled "[https://eprint.iacr.org/2003/054.pdf ID Based Cryptosystems with Pairing on Elliptic Curve]."[6] It was standardized in IEEE 1363.3, in ISO/IEC 18033-5:2015 and IETF RFC 6508.[4][7][8]

SM9 Identity Based Key Agreement

The Identity Based Key Agreement algorithm in SM9 traces its origins to a 2004 paper by McCullagh and Barreto titled, "A New Two-Party Identity-Based Authenticated Key Agreement" [https://eprint.iacr.org/2004/122.pdf].[9] The International Standards Organization incorporated this identity key exchange protocol algorithm into ISO/IEC 11770-3 in 2015.[10]

Implementations of SM9

An open source implementation of the SM9 algorithms is part of the GMSSL package available on Github.[11] The Shenzhen Aolian Information Security Technology Co (also known as Olym Tech) is also marketing a series of products that implement the SM9 algorithms.[12]

Further Information

The following links provide more detailed information on the SM9 algorithms in English:

  • [https://eprint.iacr.org/2017/117.pdf The SM9 Cryptographic Schemes][13]
  • [https://tools.ietf.org/pdf/draft-wang-tls-raw-public-key-with-ibc-08.pdf Using Identity as Raw Public Key in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)]

References

1. ^{{Cite web|url=http://www.oscca.gov.cn/sca/xxgk/2016-03/28/content_1002407.shtml|title=国家密码管理局关于发布《SM9标识密码算法》等2项密码行业标准公告(国密局公告第30号)_国家密码管理局|website=www.oscca.gov.cn|access-date=2019-03-18}}
2. ^{{Citation|last=Guan|first=Zhi|title=中华人民共和国密码行业标准(GM/T)文本. Contribute to guanzhi/GM-Standards development by creating an account on GitHub|date=2019-03-14|url=https://github.com/guanzhi/GM-Standards|access-date=2019-03-17}}
3. ^{{Cite journal|last=Barreto|first=Paulo S. L. M.|last2=Libert|first2=Benoît|last3=McCullagh|first3=Noel|last4=Quisquater|first4=Jean-Jacques|date=2005|editor-last=Roy|editor-first=Bimal|title=Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps|url=https://link.springer.com/chapter/10.1007/11593447_28|journal=Advances in Cryptology - ASIACRYPT 2005|series=Lecture Notes in Computer Science|language=en|publisher=Springer Berlin Heidelberg|pages=515–532|doi=10.1007/11593447_28|isbn=9783540322672}}
4. ^{{Cite web|url=https://standards.ieee.org/standard/1363_3-2013.html|title=IEEE 1363.3-2013 - IEEE Standard for Identity-Based Cryptographic Techniques using Pairings|website=standards.ieee.org|access-date=2019-03-17}}
5. ^{{Cite web|url=http://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/06/42/64267.html|title=ISO/IEC 14888-3:2016|last=14:00-17:00|website=ISO|language=en|access-date=2019-03-17}}
6. ^{{Cite journal|last=SAKAI|first=Ryuichi|last2=KASAHARA|first2=Masao|date=2003|title=ID based Cryptosystems with Pairing on Elliptic Curve|url=https://eprint.iacr.org/2003/054}}
7. ^{{Cite web|url=http://www.iso.org/cms/render/live/en/sites/isoorg/contents/data/standard/05/99/59948.html|title=ISO/IEC 18033-5:2015|last=14:00-17:00|website=ISO|language=en|access-date=2019-03-17}}
8. ^{{Cite web|url=https://tools.ietf.org/html/rfc6508.html|title=Sakai-Kasahara Key Encryption (SAKKE)|last=Groves |first=Michael|website=tools.ietf.org|language=en|access-date=2019-03-17}}
9. ^{{Cite journal|last=McCullagh|first=Noel|last2=Barreto|first2=Paulo S. L. M.|date=2004|title=A New Two-Party Identity-Based Authenticated Key Agreement|url=https://eprint.iacr.org/2004/122}}
10. ^{{Cite web|url=https://myibc.net/technology/policy-standard/standard.html|title=行业标准-奥联信息安全,SM9算法,基于标识的密码算法,国家商密算法,发改委指定邮件加密算法|website=myibc.net|access-date=2019-03-25}}
11. ^{{Citation|last=Guan|first=Zhi|title=支持国密SM2/SM3/SM4/SM9/ZUC/SSL的OpenSSL分支. Contribute to guanzhi/GmSSL development by creating an account on GitHub|date=2019-03-25|url=https://github.com/guanzhi/GmSSL|access-date=2019-03-25}}
12. ^{{Cite web|url=https://myibc.net/|title=首页-奥联信息安全,SM9算法,基于标识的密码算法,国家商密算法,发改委指定邮件加密算法|website=myibc.net|access-date=2019-03-25}}
13. ^{{Cite journal|last=Cheng|first=Zhaohui|date=2017|title=The SM9 Cryptographic Schemes|url=https://eprint.iacr.org/2017/117}}

1 : Cryptography standards

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/13 19:06:31