References
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2009. http://www.bitcoin.org/bitcoin.pdf 2
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, 1984. 47–53
Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proceedings of Symposium on Cryptography and Information Security, 2000. 26–28
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proceedings of Annual International Cryptology Conference, 2001. 213–229
Lindell Y. Fast secure two-party ECDSA signing. In: Proceedings of Annual International Cryptology Conference, 2017. 613–644
Desmedt Y, Frankel Y. Threshold cryptosystems. In: Proceedings of Conference on the Theory and Application of Cryptology, 1989. 307–315
Desmedt Y, Frankel Y. Shared generation of authenticators and signatures. In: Proceedings of Annual International Cryptology Conference, 1991. 457–469
Paillier P. Public-key cryptosystems based on composite degree residuosity classes. In: Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 1999. 223–238
Canetti R, Lindell Y, Ostrovsky R, et al. Universally composable two-party and multi-party secure computation. In: Proceedings of the 34th Annual ACM Symposium on Theory of Computing, 2002. 494–503
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Mu, Y., Xu, H., Li, P. et al. Secure two-party SM9 signing. Sci. China Inf. Sci. 63, 189101 (2020). https://doi.org/10.1007/s11432-018-9589-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-018-9589-x