Abstract
The SM9 algorithm represents a sophisticated advancement in cryptographic protocols, characterized by its unique implementation of bilinear pairing techniques and identity-based encryption mechanisms. Unlike conventional approaches, SM9 leverages the user's identity directly in the generation of cryptographic keys, streamlining the process and enhancing security. This method stands in contrast to traditional schemes like SM2, which typically rely on external certificate management for public key association. Central to its innovation is the seamless integration of identity information into the public key itself, thereby simplifying the encryption process and reducing the overhead associated with certificate handling. SM9's versatility extends to various applications, including digital signature creation, robust data encryption, secure key exchange, and reliable identity verification. This algorithm has garnered significant attention for its ability to maintain a high level of security while offering greater efficiency and user convenience. By directly binding keys to user identities, it eliminates several complexities and potential vulnerabilities inherent in certificate-based systems. As a result, SM9 has demonstrated remarkable performance and utility across a wide range of research and practical applications, making it a noteworthy subject of study in the field of modern cryptography.
Reference10 articles.
1. Bergman Martinkauppi, L., & He, Q. (2019). Performance Evaluation and Comparison of Standard Cryptographic Algorithms and Chinese Cryptographic Algorithms.
2. Tian, C., Wang, L., & Li, M. (2020, September). Design and implementation of SM9 Identity based Cryptograph algorithm. In 2020 International Conference on Computer Network, Electronic and Automation (ICCNEA) (pp. 96-100). IEEE.
3. Shi, Y., Ma, Z., Qin, R., Wang, X., Wei, W., & Fan, H. (2019). Implementation of an attribute-based encryption scheme based on SM9. Applied Sciences, 9(15), 3074.
4. Liu, X., Huang, X., Cheng, Z., & Wu, W. (2024). Fault-tolerant identity-based encryption from SM9. Science China Information Sciences, 67(2), 122101.
5. Zhu, X., Xu, H., Zhao, Z., & others. (2021). An Environmental Intrusion Detection Technology Based on WiFi. Wireless Personal Communications, 119(2), 1425-1436.