Provably-secure (Chinese government) SM2 and simplified SM2 key exchange protocols.

ScientificWorldJournal

Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes, SA 5095, Australia.

Published: June 2015


Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

We revisit the SM2 protocol, which is widely used in Chinese commercial applications and by Chinese government agencies. Although it is by now standard practice for protocol designers to provide security proofs in widely accepted security models in order to assure protocol implementers of their security properties, the SM2 protocol does not have a proof of security. In this paper, we prove the security of the SM2 protocol in the widely accepted indistinguishability-based Bellare-Rogaway model under the elliptic curve discrete logarithm problem (ECDLP) assumption. We also present a simplified and more efficient version of the SM2 protocol with an accompanying security proof.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4167658PMC
http://dx.doi.org/10.1155/2014/825984DOI Listing

Publication Analysis

Top Keywords

sm2 protocol
16
chinese government
8
sm2
6
protocol
6
security
6
provably-secure chinese
4
government sm2
4
sm2 simplified
4
simplified sm2
4
sm2 key
4

Similar Publications

Scramblases are membrane proteins that translocate phospholipids bidirectionally between the leaflets of a membrane bilayer. Examples of scramblases include Class A G protein-coupled receptors (GPCRs), members of the TMEM16 and DedA protein families, and protein insertases. To measure scramblase activity, the protein of interest is purified and reconstituted into large unilamellar vesicles that contain trace amounts of a fluorescent phospholipid reporter.

View Article and Find Full Text PDF

Purpose: The Celeris system (Diagnosys LLC) offers a streamlined alternative to the gold-standard Espion system for high-throughput electroretinography (ERG) and visual evoked potentials (VEP) in preclinical studies. This study evaluated its inter-session repeatability of ERG and VEP measurements in healthy rodent retinae.

Methods: Twenty-five wild type Brown Norway rats underwent ERG and VEP testing across two sessions.

View Article and Find Full Text PDF

Purpose: To establish a clinically applicable dark-adapted 15 Hz flicker electroretinogram (ERG) for sensitive detection of functional changes in the fast and the slow retinal rod pathways.

Methods: The study consisted of two parts. In the first part, the paradigm of the previously demonstrated "null-effect" of stimulus luminance on ERG-amplitudes for 15 Hz flicker stimuli with duration of 2.

View Article and Find Full Text PDF

To evaluate the effectiveness of the non-mydriatic mode of the HE-2000 electroretinogram (ERG) by comparing photopic ERGs of non-mydriatic versus dilated eyes. This retrospective study included patients with grade 2 cataracts between January and July 2022. Photopic ERGs were recorded using the HE-2000 system in mydriatic eyes with a 3 cd·s/m flashing stimulus and in non-mydriatic eyes using the non-mydriatic mode with a 10 cd·s/m stimulus.

View Article and Find Full Text PDF

Objectives: Clinical translation of advanced MRI techniques can be hindered by the challenges of performing standardized multicentre imaging trials. This work aims to develop and demonstrate an automated tool for monitoring imaging protocol deviations, enabling corrective action to be taken.

Methods: A Python-based tool, integrated into the imaging repository XNAT, was developed to compare DICOM series with an agreed imaging protocol, highlighting missing series and parameter deviations.

View Article and Find Full Text PDF