Page 470 - 《软件学报》2025年第8期
P. 470

唐长虹 等: 加权门限     SM2  签名方案                                                       3893



                                                        验证通过        加权门限SM2
                                           区块链模块                    签名方案模块

                                                            ≥T个用户签名
                                                   投票结果
                                          请求投票                       签名验证




                                                               t
                                                            T
                                                         n
                                                          用户

                                         图 1 基于加权门限       SM2  签名的区块链投票系统

                 7   总 结

                    本文基于高效的       WRSS  提出了两种能够实现加权功能的门限            SM2  数字签名, 当且仅当所有参与者的权重之
                 和大于或等于一个固定的阈值时, 该秘密才可以被重构. 在秘密分割时, 对                      SM2  数字签名算法的签名私钥进行变
                 形, 并对公钥做出调整, 使其在签名阶段恢复密钥进行签名得到简化. 本文进一步给出了方案的正确性和安全性分
                 析, 并与门限   SM2  签名以及联合    SM2  签名的进行计算开销和功能性对比. 结果表明本文方案计算开销最小; 在功
                 能上提供加权的性质, 使得方案更具健壮性. 并且参与者可以执行离线操作的预签名阶段, 提高了运算效率, 有效
                 降低了通信开销. 在现实应用中通常需要综合考虑参与者分配权重, 本文探索基于加权门限                             SM2  签名的区块链投
                 票系统, 扩展了国密      SM2  签名的现实应用.

                 References:
                  [1]  Xu QL, Li DX. Elliptic curve cryptosystems. Journal of Computer Research and Development, 1999, 36(11): 1281–1288 (in Chinese with
                     English abstract).
                  [2]  Wang CH, Zhang ZF. Overview on public key cryptographic algorithm SM2 based on elliptic curves. Journal of Information Security
                     Research, 2016, 2(11): 972–982 (in Chinese with English abstract).
                  [3]  State Cryptography Administration. SM2 elliptic curve cryptographic algorithm. 2010 (in Chinese). https://www.oscca.gov.cn/sca/xxgk/
                     2010-12/17/content_1002386.shtml
                  [4]  Lin JQ, Ma Y, Jing JW, Wang QX, Lei LG, Cai QW, Wang L. Signing and decrypting method and system applied to cloud computing
                     and based on SM2 algorithm. CN: 104243456A, 2014-12-24 (in Chinese).
                  [5]  He  DB,  Zhang  JN,  Feng  Q,  Wang  J,  Chen  MW.  Lightweight  SM2  two-party  collaborative  digital  signature  generation  method.  CN:
                     110011803A, 2019-07-12 (in Chinese).
                  [6]  He DB, Feng Q, Wang J, Lin C, Zhang YD, Zhang JN. Method for jointly generating SM2 digital signature by multiple parties. CN:
                     109547199A, 2019-03-29 (in Chinese).
                  [7]  He DB, Zhang YD, Lin C, Feng Q, Wang J, Zhang JN. A multi-party collaborative method for generating SM2 digital signatures. CN:
                     109474422A, 2019-03-15 (in Chinese).
                  [8]  Zhang YD, He DB, Zhang MW, Choo KKR. A provable-secure and practical two-party distributed signing protocol for SM2 signature
                     algorithm. Frontiers of Computer Science, 2020, 14(3): 143803. [doi: 10.1007/s11704-018-8106-9]
                  [9]  Hou HX, Yang B, Zhang LN, Zhang MR. Secure two-party SM2 signature algorithm. Acta Electronica Sinica, 2020, 48(1): 1–8 (in
                     Chinese with English abstract). [doi: 10.3969/j.issn.0372-2112.2020.01.001]
                 [10]  Feng  Q,  He  DB,  Luo  M,  Li  L.  Efficient  two-party  SM2  signing  protocol  for  mobile  Internet.  Journal  of  Computer  Research  and
                     Development, 2020, 57(10): 2136–2146 (in Chinese with English abstract). [doi: 10.7544/issn1000-1239.2020.20200401]
                 [11]  Su XY, Tian HB. A two-party SM2 signing Protocol and its application. Chinese Journal of Computers, 2020, 43(4): 701–710 (in Chinese
                     with English abstract). [doi: 10.11897/SP.J.1016.2020.00701]
   465   466   467   468   469   470   471   472   473   474   475