Practical two-party SM2 signing using multiplicative-to-additive functionality

Threshold signatures are important tools for addressing issues related to key management, certificate management, and cryptocurrencies. Among them, two-party SM2 signatures have received considerable interest recently. In this paper, we propose a fast and secure online/offline two-party SM2. By empl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computer standards and interfaces 2025-03, Vol.92, p.103928, Article 103928
Hauptverfasser: Li, Shiyang, Yang, Wenjie, Zhang, Futai, Huang, Xinyi, Chen, Rongmao
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Threshold signatures are important tools for addressing issues related to key management, certificate management, and cryptocurrencies. Among them, two-party SM2 signatures have received considerable interest recently. In this paper, we propose a fast and secure online/offline two-party SM2. By employing the re-sharing technique, we have successfully made the online phase of the signing process non-interactive while achieving nearly optimal computational efficiency. Additionally, in the offline phase, there is just a single call to the multiplicative-to-additive functionality based on Paillier encryption. Our protocol is existentially unforgeable under adaptive chosen message attacks in the random oracle model in the presence of a static adversary. Experimental results demonstrate that our proposed scheme outperforms previous similar schemes by approximately a factor of 2 in online computation and a factor of 3 in online communication. Our scheme can be applied in scenarios such as Certificate Authority (CA) and the signing of blockchain transactions to provide them with a more secure and flexible implementation method, enhancing the security and reliability of the systems. •A practical online/offline two-party SM2 with non-interactive online phase.•Re-sharing technique for optimal computational efficiency in two-party SM2.•Significant performance improvements both in computation and communication.•Proposed scheme outperforms the state-of-the-art two-party ECDSA in performance.•Enhances security and flexibility for Certificate Authority, Blockchain, etc.
ISSN:0920-5489
DOI:10.1016/j.csi.2024.103928