An Overview of the Chinese SM9 Algorithm: A Cutting-Edge Cryptographic Breakthrough

Authors

  • Wenbo Ma
  • Zejun Ni

DOI:

https://doi.org/10.62051/vqz8a719

Keywords:

Cryptography; Identity-Based Cryptograph; SM9; Digital signature.

Abstract

The SM9 algorithm represents a sophisticated advancement in cryptographic protocols, characterized by its unique implementation of bilinear pairing techniques and identity-based encryption mechanisms. Unlike conventional approaches, SM9 leverages the user's identity directly in the generation of cryptographic keys, streamlining the process and enhancing security. This method stands in contrast to traditional schemes like SM2, which typically rely on external certificate management for public key association. Central to its innovation is the seamless integration of identity information into the public key itself, thereby simplifying the encryption process and reducing the overhead associated with certificate handling. SM9's versatility extends to various applications, including digital signature creation, robust data encryption, secure key exchange, and reliable identity verification. This algorithm has garnered significant attention for its ability to maintain a high level of security while offering greater efficiency and user convenience. By directly binding keys to user identities, it eliminates several complexities and potential vulnerabilities inherent in certificate-based systems. As a result, SM9 has demonstrated remarkable performance and utility across a wide range of research and practical applications, making it a noteworthy subject of study in the field of modern cryptography.

Downloads

Download data is not yet available.

References

Bergman Martinkauppi, L., & He, Q. (2019). Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms.

Tian, C., Wang, L., & Li, M. (2020, September). Design and implementation of SM9 Identity based Cryptograph algorithm. In 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA) (pp. 96-100). IEEE. DOI: https://doi.org/10.1109/ICCNEA50255.2020.00029

Shi, Y., Ma, Z., Qin, R., Wang, X., Wei, W., & Fan, H. (2019). Implementation of an attribute-based encryption scheme based on SM9. Applied Sciences, 9(15), 3074. DOI: https://doi.org/10.3390/app9153074

Liu, X., Huang, X., Cheng, Z., & Wu, W. (2024). Fault-tolerant identity-based encryption from SM9. Science China Information Sciences, 67(2), 122101. DOI: https://doi.org/10.1007/s11432-022-3706-7

Zhu, X., Xu, H., Zhao, Z., & others. (2021). An Environmental Intrusion Detection Technology Based on WiFi. Wireless Personal Communications, 119(2), 1425-1436. DOI: https://doi.org/10.1007/s11277-021-08288-4

Piao, L., NuanQiang, Y., Han**an, H., Man, L. J., ShuFeng, Y., RuiJue, F., & MengZhen, S. (2021, December). Power Data Collection Terminal Protection Based on SM9. In 2021 International Conference on Power System Technology (POWERCON) (pp. 1877-1882). IEEE. DOI: https://doi.org/10.1109/POWERCON53785.2021.9697833

Martinkauppi, L. B., He, Q., & Ilie, D. (2020, June). On the design and performance of Chinese OSCCA-approved cryptographic algorithms. In 2020 13th International Conference on Communications (COMM) (pp. 119-124). IEEE. DOI: https://doi.org/10.1109/COMM48946.2020.9142035

Shen, S., Yang, Y., & Liu, X. (2023). Toward data privacy preservation with ciphertext update and key rotation for IoT. Concurrency and Computation: Practice and Experience, 35(20), e6729. DOI: https://doi.org/10.1002/cpe.6729

Zhu, X., Huang, Y., Wang, X., & Wang, R. (2023). Emotion recognition based on brain-like multimodal hierarchical perception. Multimedia Tools and Applications, 1-19. DOI: https://doi.org/10.1007/s11042-023-17347-w

Yin, D., Zhang, M., & Wei, B. (2021, September). Blockchain E-voting scheme based on SM9 partial blind signature. In 2021 International Conference on Computer Information Science and Artificial Intelligence (CISAI) (pp. 1005-1011). IEEE. DOI: https://doi.org/10.1109/CISAI54367.2021.00201

Downloads

Published

12-08-2024

How to Cite

Ma, W. and Ni, Z. (2024) “An Overview of the Chinese SM9 Algorithm: A Cutting-Edge Cryptographic Breakthrough”, Transactions on Computer Science and Intelligent Systems Research, 5, pp. 21–25. doi:10.62051/vqz8a719.