Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2024 Dec 10;24(24):7874. doi: 10.3390/s24247874

Enhancing Efficiency in Trustless Cryptography: An Optimized SM9-Based Distributed Key Generation Scheme

Jinhong Chen 1,2, Xueguang Zhou 1, Wei Fu 1,*, Yihuan Mao 1
Editors: Cong Wu, Jing Chen, Yebo Feng, Xianhao Chen
PMCID: PMC11679003  PMID: 39771613

Abstract

Intelligent systems are those in which behavior is determined by environmental inputs, and actions are taken to maximize the probability of achieving specific goals. Intelligent systems are widely applied across various fields, particularly in distributed intelligent systems. At the same time, due to the extensive interaction with user data, intelligent systems face significant challenges regarding security. This study proposes an optimized distributed key generation (DKG) scheme for identity-based cryptography (IBC) using the SM9 standard. Our scheme introduces a (t, n)-threshold system that functions without a trusted center, addressing the vulnerability of single points of failure in conventional key generation centers (KGCs). We reduce communication and computational demands by refining the Paillier share transformation protocol, ensuring efficient, centerless operations. The scheme’s security, validated in the existential unforgeability against adaptive chosen identity attacks (EUF-CIA) model, demonstrates its practical applicability and enhanced security for distributed intelligent systems.

Keywords: intelligent system, distributed key generation, identity-based cryptography, share transformation protocol, SM9

1. Introduction

Intelligent systems are those in which behavior is determined by environmental inputs, and actions are taken to maximize the probability of achieving specific goals. Intelligent systems are widely applied across various fields [1], such as transportation [2], healthcare [3,4], smart homes [5], and the Internet of Things, providing more efficient and intelligent services to humanity [4]. However, the integration of different technologies and extensive interaction with user data also creates opportunities for malicious activities, posing significant challenges to the security of intelligent systems [1]. In recent years, significant research has focused on the role of intelligent systems in enhancing cybersecurity. There is an increasing discourse around the applications of artificial intelligence (AI), machine learning, and deep learning within the field of cybersecurity [6,7]. Authentication technology is particularly critical in this context, especially within distributed intelligent systems, where ensuring identity security becomes a top priority.

The distributed key generation (DKG) technique, a multifaceted cryptographic protocol, engages numerous participants with the primary objective of bolstering the security and dependability of network applications. This property is achieved through the collaborative and secure generation and management of cryptographic keys in a distributed architecture. The strategic allocation and storage of key fragments across multiple key generation centers (KGCs), facilitated through collective negotiation, markedly reduces the vulnerabilities associated with single-point failures and the potential for privileged misuse. In contemporary practice, DKG methods have been extensively applied to facilitate secure communications among various users, underpinning their significance in the current digital communication context.

Pedersen [8] introduced a pioneering DKG protocol designed for discrete logarithm-based threshold cryptographic systems, which has also been used as a subprotocol in cryptographic signature and decryption computations. Notably, the initial protocol lacked a comprehensive elucidation of the security framework of the protocol. This gap was addressed by Gennaro et al. [9], who not only identified and articulated the security shortcomings of Pedersen’s approach but also developed and rigorously proved the security of an enhanced DKG protocol. This novel protocol advances security measures without compromising operational efficiency. Furthermore, Gennaro et al. [10] extended their study by integrating Pedersen’s protocol within Schnorr [11] signatures.

In a major stride towards practical deployment, Kate and Goldberg [12] unveiled the inaugural application of the DKG framework in an internet setting by establishing a proven secret sharing mechanism. Concurrently, Fouque and Stern [13], Zhang and Imai [14], and Canny and Sorkin [15] explored noninteractive and scalable DKG protocols. Zhang and Wang [16] introduced a versatile DKG protocol based on a discrete logarithmic public key infrastructure. Characterized by minimal data requirements for secret preservation, assured randomness, and uniform private key distribution, this protocol can be distinguished because of its various applications in group cryptography beyond conventional threshold structures.

To further advance the field, Zhang [17] proposed a DKG protocol grounded in information-theoretic security principles that featured a verifiable secret sharing scheme adapted to vector space access structures and complete security proof. Zha et al. [18] developed an adaptive DKG scheme that facilitates dynamic membership changes, thereby enhancing system efficiency. Zhang and Zhang [19] focused on bilinear group applications, and Wang et al. [20] introduced a DKG algorithm designed for the Lewko–Waters identity encryption protocol, thereby significantly bolstering the resilience and robustness of its key management system. Lindell and Nof [21] proposed an elliptic curve digital signature algorithm (ECDSA)-based DKG protocol by incorporating zero-knowledge proofs to safeguard against dishonest participation. Finally, Gennaro and Goldfeder [22] introduced a threshold DKG protocol within ECDSA by employing a homomorphic share transformation protocol to potentially minimize participant numbers.

In 1984, Shamir [23] introduced a groundbreaking identity-based cryptosystem, demonstrating a seminal advancement in identity-based cryptography (IBC). This system innovatively employs a unique identifier as the public key, thereby greatly streamlining the key management process by eliminating the conventional key distribution paradigm inherent in traditional public key cryptography. In this framework, a user’s public key is algorithmically derived from a unique identifier, thereby obviating the need for a certifying authority to validate the authenticity of the public key. This mechanism enhances the security profile of the system by centralizing the generation and distribution of private keys to the users through the KGC [24], although the notion of private keys being exclusive to the user is thus redefined. Despite the efficacy of IBC in bolstering security within zero-trust network environments, the secure deployment of such a public key infrastructure poses considerable challenges [25].

In 2016, the advent of the identity-based cryptographic algorithm SM9, released by the China Cryptography Administration [26], marked a significant milestone in cryptographic standards. Notably, the digital signature algorithm component of SM9 has been recognized and adopted by the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) international standards, underscoring its global acceptance and reliability. As the sole identity cipher algorithm standard emanating from China, SM9 plays a pivotal role in safeguarding the integrity and confidentiality of information systems across various sectors by handling commercial secrets within the country [27]. The widespread deployment of SM9 identity-based cryptographic algorithms across numerous domains attests to their foundational contribution to ensuring the security of China’s autonomously controlled infrastructure networks.

Recent studies have explored various facets of the SM9 DKG scheme, yielding noteworthy advancements and identifying persistent challenges (Table 1). Ma [28] introduced a threshold DKG protocol by leveraging the SM9 algorithm, which is notable for its requirement of a relatively high number of participants. Similarly, Zhang et al. [25] developed an SM9-based threshold protocol and encountered analogous concerns regarding participant numbers. Tu et al. [29] investigated the domain of homomorphic secure multi-party computation to propose an SM9 threshold protocol that can accommodate various application scenarios within the threshold DKG framework. However, reliance on homomorphic encryption introduces a significant computational overhead, thereby limiting its practicality. Conversely, Yu et al. [30] presented a distributed identity cryptography management scheme that, although innovative, is constrained to bipartite protocol implementation, thus restricting its broader applicability.

Table 1.

Distributed key generation protocol based on SM9.

Scheme Number of Parties (t,n) Threshold Relationship Between t and n System Cost
Ma [28] Multi-party n ≥ 2t−1 Moderate
Zhang et al. [25] Multi-party n ≥ 2t−1 Moderate
Tu et al. [29] Multi-party n ≥ t High
Yu et al. [30] Two-party × n = t = 2 Low

In the context of SM9 DKG, where t denotes the number of KGCs actively participating in the key generation process and n denotes the total number of KGCs with secret shares, our analysis reveals a critical observation. Among the various schemes reviewed, only the one proposed by Tu et al. [30] achieves the optimal threshold value (t), which is a crucial metric for system security and reliability. However, this achievement comes at a significant cost, thus rendering the system impractical for widespread deployment due to excessive overheads. In contrast, our proposed scheme attains this optimal threshold value and introduces substantial reductions in the system costs. These two advantages significantly enhance the practicability of our scheme, positioning it as a more viable solution for real-world applications.

The main contribution of this study concerns an enhanced (t,n)-threshold DKG scheme based on SM9, devoid of reliance on trusted centers, called the SM9-based lightweight DKG scheme. Our innovative approach significantly mitigates the communication overhead and computational demands of the Paillier homomorphic encryption and decryption processes by refining the Paillier share transformation protocol while maintaining the optimal threshold value. Furthermore, we rigorously demonstrate the security of our scheme within the existential unforgeability against adaptive chosen identity attack (EUF-CIA) model, providing a formal security proof that establishes the reduction in our scheme to the τ-BCAA1 problem under the random oracle model.

2. Preliminaries

2.1. Shamir Threshold Secret Sharing Scheme

The Shamir threshold secret sharing scheme, introduced by Shamir et al. in 1979, is a foundational cryptographic protocol designed to distribute and reconstruct secrets securely. It operates on the principles of the Lagrange interpolation theorem and can be delineated into two primary phases. Figure 1 shows the flowchart of the Shamir threshold secret sharing scheme.

Figure 1.

Figure 1

Shamir Threshold Secret Sharing Flowcharts.

  1. Distribution Stage

In this initial phase, the dealer, aiming to securely share a secret, first selects arbitrary coefficients ai from the multiplicative group ZN* for i=0 to t1, where t denotes the threshold number of participants required for secret reconstruction. The dealer then chooses n distinct, non-zero elements xi from ZN*, formulating a polynomial fx=i=0t1aixi, where a0 represents the secret. Subsequently, the dealer computes the shares si=fxi for each participant Ui, distributing them accordingly.

  • 2.

    Recovery Stage

During the reconstruction phase, any group of t participants can collaboratively recreate the original polynomial fx utilizing the Lagrange interpolation theorem. By setting x=0, the secret a0 is revealed through the formula: a0=i=0t1sij=0jit1xjxjxi.

2.2. Paillier Homomorphic Encryption Algorithm

The Paillier homomorphic encryption algorithm, predicated on the complexity of the residual class problem, is a pivotal cryptographic scheme for encrypted data processing. This algorithm encompasses three principal steps:

  1. Key Generation
    • (a)
      Begin by selecting two large prime numbers p and q of identical length, ensuring that gcdpq,p1q1=1, where gcd represents the Greatest Common Divisor.
    • (b)
      Calculate n=pq and λ=lcmp1,q1, where lcm represents the Least Common Multiple.
    • (c)
      Set g=n+1, and define the function Lx=x1n. Compute μ=Lgλmod n21mod n, where mod represents the modulus operation.
    • (d)
      The public key is given by n,g, and the private key by λ,μ.
  2. Encryption
    • (a)
      For a message m within the range 0,n, select a random number r from Zn* where gcdr,n=1.
    • (b)
      Compute the ciphertext c as c=gmrnmod n2.
  3. Decryption
    • (a)
      Given ciphertext c, confirm cZn2*.
    • (b)
      Derive the message m as m=Lcλmod n2·μ mod n.

The Paillier algorithm is distinguished by its capacity for additive and scalar multiplication homomorphic encryption, delineated as follows:

  1. Addition homomorphism

For ciphertexts c1 and c2, the encrypted sum is c1c2=Encpkm1+m2, and hence, Decpkc1c2=DecpkEncpkm1+m2=m1+m2

  • 2.

    Scalar multiplication homomorphism

For a ciphertext c1 and a scalar k, the operation c1k=Encpkm1k allows for the encrypted product to be decrypted as Decpkc1k=DecpkEncpkm1k=k  m1

2.3. Paillier-Based Share Conversion Protocol

This protocol facilitates two parties, Alice and Bob, who possess multiplicative shares a,bZn of a secret, such that x=ab mod n, in securely converting these shares into additive shares α+β=x. The steps are meticulously designed to maintain confidentiality throughout the process.

  1. Initial encryption and share transmission

Alice begins by encrypting her share a using her public key, resulting in ca=Encpka. She then transmits ca to Bob.

  • 2.

    Bob’s calculation and transmission

Upon receiving ca, Bob computes cb=cab  Encpkβ=Encpkab+β, where βRZn. Bob deduces his additive share of the secret as β=β and forwards cb to Alice.

  • 3.

    Alice’s decryption and share derivation

Alice, upon receiving cb, decrypts it to ascertain her additive share of the secret, α=Decskcb.

This protocol effectively enables Alice and Bob to transition from holding multiplicative shares of a secret to possessing additive shares, thereby facilitating various cryptographic operations while preserving the privacy of their inputs.

2.4. SM9 Digital Signature Algorithm: An Overview

The SM9 digital signature algorithm, anchored in the principles of bilinear pairings, delineates a comprehensive procedure for secure digital signing and verification. It unfolds through the following stages:

  1. System setup
    • (a)
      Initialization is performed by inputting safety parameters k, two additive cyclic groups G1, G2 of prime order N, and one multiplicative cyclic group GT also of prime order N, ensuring these groups satisfy a bilinear mapping e:G1×G2GT. The groups G1, G2 are defined by their generators P1,P2, respectively.
    • (b)
      Define two hash functions H1:0,1*ZN*,H2:0,1*ZN*.
    • (c)
      The KGC selects a master private key mskZN*, computes the master public key mpk=msk  P2, and selects a signature private key generation function identifier hid.
    • (d)
      KGC broadcasts the public system param=<G1,G2,GT,P1,P2,mpk,N,H1,H2,hid> and securely stores msk.
  2. User signature private key extraction
    • (a)
      KGC computes t1=(H1IDAhid,N+mskmod N. If t1=0, KGC retries with a different msk. Otherwise, it proceeds by calculating t2=mskt11modN.
    • (b)
      The signature private key ds=t2  P1 is then computed and sent to the user identified by IDA.
  3. Digital signature creation
    • (a)
      The signer computes g=eP1,mpk.
    • (b)
      A random positive integer rRZN* is selected to compute w=gr.
    • (c)
      The hash h=H2(Msg||w,N).
    • (d)
      The signer computes l=rhmodN. If l=0, r is reselected; otherwise, the signature S=l  ds is formed, with h,S constituting the digital signature of Msg.
  4. Verification
    • (a)
      The verifier, equipped with system parameters, user identification IDA, message Msg, and digital signature h,S, first checks if hZN* and S is a point in G1.
    • (b)
      Calculations are performed to validate the signature: compute t=gh, hIDA=H1=(IDA||hid,N), P=hIDAP2+mpk, and u=eS,P, then w=u  t.
    • (c)
      If h=H2(Msg||w,N), the signature is verified successfully; otherwise, the verification fails.

3. SM9-Based Lightweight Distributed Key Generation Scheme

In this section, we focus on the formal definition of a scheme, the description of a scheme, and scheme security.

3.1. System Model

In the proposed scheme, depicted in Figure 2, we delineate a system comprising the following three pivotal entities: the KGC, Combine Center, and User. These entities are foundational to the architecture, each playing a unique role.

Figure 2.

Figure 2

Distributed key generation system model.

  1. Key generation center (KGC)

Entrusted with generating segments of both the master public and private keys, the KGC is integral to facilitating secure and distributed cryptographic operations. It operates within a collaborative network of centers in which each can securely produce valid signature private key fragments for users based on their unique identifiers (IDs). This distributed mechanism significantly bolsters the security of the system, mitigating risks associated with centralized key management frameworks and underscoring the central role of the KGC in preserving the integrity and confidentiality of the cryptographic process.

  • 2.

    Combine center

Tasked with the critical role of amalgamating signature private key fragments into a singular, valid signature private key, the operations of the Combine Center are marked by precision and stringent security measures to thwart unauthorized access or tampering. Upon successful assembly of the signature private key, it is securely dispatched to the designated user, thereby facilitating the execution of cryptographic operations without imposing the technical complexities of key generation upon the end user.

  • 3.

    User

Positioned as the endpoint in our cryptographic narrative, the user, encompassing a broad spectrum of devices within the Internet of Things (IoT) ecosystem, is the beneficiary and operator of the signature private key. This role extends beyond human interaction to include an array of devices by leveraging the secure infrastructure established by the KGC and Combine Center for authenticated and encrypted communications.

3.2. Scheme Definition

This subsection outlines the architecture of the SM9-based lightweight DKG scheme, incorporating advancements from prior studies. Key features include a distributed configuration, private key derivation, and amalgamation processes, detailed as follows.

  1. Distributed setup (DSetup)

mski,mpki,ski,pkiDSetupt,n,ϱ (1)

Given parameters t,n, and ϱ, where t represents the threshold number, n is the number of Key Generation Centers (KGCs), and ϱ denotes the public system parameter, the distributed setup generates:

  • mski: The private key slice for KGCi,

  • mpki: The public key fragment for KGCi,

  • ski,pki: The Paillier key pair for KGCi.

  • 2.

    Distributed private key extraction (DExtract)

(dsi)DExtract(ID,mski) (2)

For a user with identifier ID, this process extracts dsi, representing the user’s private key share from each KGCi, utilizing their respective mski.

  • 3.

    Combine private key

dsCombinedsi (3)

The user’s private key, ds, is synthesized from the individual shares dsi, effectively combining them into a singular private key.

3.3. Security Definition and Security Models

Here, we introduce a security framework paralleling the EUF-CMA model for digital signatures, adapted to evaluate the robustness of our scheme under stochastic predicate analysis.

Assumption 1: 

Bilinear Collision Attack Assumption (τ-BCAA1).

ψ is an isomorphism from G2 to G1 with ψP2=P1. Positive integer τ and αRZN*,P1G1,P2G2,e:G1×G2GT, as we know P1,P2,αP2,h0,h1,αh1+αP1,,hτ,αhτ+αP1, where h1RZN* and distinct for 0iτ, computing eP1,P2αh0+α is hard.

Definition 1: 

Existential Unforgeability Against Adaptive Chosen Identity Attacks (EUF-CIA): a distributed key generation scheme is deemed to exhibit existential unforgeability against adaptive chosen identity attacks (EUF-CIA) if, for any polynomial-time adversary, the advantage in succeeding in the defined security trials is negligible.

The security experiment is formalized through a game played by a challenger and an adversary. In the game, the adversary fixes At1 semi-honest KGCs and the challenger simulates B=nt honest KGCs.

Security Experiment: 

The robustness of the scheme against EUF-CIA is assessed through a structured game involving a challenger and an adversary, detailed as follows:

Setup Phase: 

The challenger and the adversary collaboratively execute the distributed setup algorithm. By the conclusion of this phase, both parties acquire all master public keys (mpk) and their respective private master key slices (mski).

Phase 1 (Query Phase): 

The adversary is permitted to adaptively request DExtract for identities of its choosing. For each query on identity IDi, the challenger engages in the DExtract and Combine Private Key processes with the adversary, subsequently providing the adversary with the private key share dsi.

Forgery Phase: 

The adversary attempts to forge private key shares dsi for an identity ID and is considered successful if:

  • The combined private key ds, derived from dsi using the Combine operation, is valid for the identity ID.

  • The private key for ID was not previously queried in Phase 1.

The advantage ϵ of winning the game is the probability of returning a valid forged private key.

3.4. Scheme Description

Our enhancement of the SM9 framework focuses on optimizing the digital signature and user-specific private key generation by employing the following innovative design principles.

Lagrange secret sharing is used to generate the master public key fragment msk by all the KGCs in the network so that the master public key mpk=msk  P2 can be calculated.

The SM9 signature private key equation is expanded as follows:

ds=mskmsk+hP1=P1hmsk+hP1=P1msk+h1hP1 (4)

Using the Pallier share transformation protocol, the msk+h1P1 can be calculated without revealing the respective secrets generated by the KGC; then, the user’s signature private key can be calculated.

The steps are as follows:

  1. Distributed setup
    • (a)
      KGCi uses the recommended values in the SM9 state secret standard for system parameter generation.
    • (b)
      KGCi generates the respective Paillier public-private key pairs (pki,ski), then broadcasts pki.
    • (c)
      KGCi selects a random polynomial of degree t − 1, fix=j=0t1aij  xj, where ai0 is the secret share chosen by KGCi. It broadcasts Cij=aijP2,i1,n&j1,t1.
    • (d)
      KGCi calculates fixj, where xj is the secure hash value of KGCj’s identity. It secretly sends the calculation result fixj to KGCj.
    • (e)
      After receiving fjxI from KGCj, KGCi verifies that j=0t1Cij  xij=fjxiP2. If the verification passes, it indicates that KGCj has not cheated and moves to the next step.
    • (f)
      All KGCi can calculate the master public key mpk=i=1nCi0=i=1nai0P2.
  2. Distributed private key extract
    • (a)
      KGCi calculates the main private key shard, a t-threshold private key share ki=i=1nfjxi.
    • (b)
      KGCi calculates the hash value of user identity h=H1(IDA||hid,N).
    • (c)
      KGCi randomly chooses γjRZN* and invokes the Paillier share conversion protocol to calculate:
    • (d)
      k1hP1=i=0t1kij=0t1γj1j=0t1γjhP1=(i=0t1δi)1j=0t1γjhP1, where the denominator part of the user signature private key k=i=0t1ki=i=0t1(λiki+ht)=i=0t1ai0+h=msk+h.
    • (e)
      Lagrange coefficient λi=j=0jit1H1IDjH1IDjH1IDi.
    • (f)
      δi is the additive share of i=0t1kii=0t1γj,δi=kiγi+j=0jit1αij+j=0jit1βij, kiγj=αij+βji
    • (g)
      KGCi broadcasts δi and computes dsi=(i=0t1δi)1γihP1
    • (h)
      KGCi sends dsi to Combine Center.
  3. Combine private key
    • (a)
      Combine Center computes user private key ds=P1i=0t1dsi=P1i=0t1δi1i=0t1γihP1=P1k1hP1=P1msk+h1hP1.

3.5. Paillier Homomorphic Share Transformation Protocol Optimization

In the existing homomorphic share transformation protocol, two entities, Alice and Bob, possess multiplicative shares that collectively satisfy the equation x=ab mod n. This protocol can help Alice and Bob realize that they hold additive share secret α and β, respectively, satisfying α+β=x.

The number of secret random numbers that any two participants require to perform a share transformation in our scheme is two. Assuming that the secret random numbers of Alice and Bob are a1,a2 and b1,b2, respectively, the final state that must be achieved is α+β=a1b2+a2b1. In our scheme, this refers to the principle that “αij+βji=kiγj+kjγi.” This signifies a specific operational relationship or mathematical model integral to the proposed scheme, which can be achieved if the previous homomorphic share transformation protocol is directly invoked twice, but it is not efficient. The reason is that two homomorphic encryption operations, one homomorphic decryption operation, and two rounds of communication are required to call this protocol once. If n participants must perform two–two secret random number share transformation, then for a total of 2n(n 1) homomorphic encryption operations, n(n 1) decryption operations, and 2n(n 1) rounds of communication, the optimization scheme is specified using the following steps.

  • Alice computes A1=a1+a2,A2=a1a2,c1=EncpkA2, then sends c1,A2 to Bob (where A2 denote the sum of two random numbers and does not reveal the specific value of the random number).

  • Bob computes B1=b1+b2,B2=b1b2,c2=c1B2Encpkr=EncpkA2B2+r,rRZn, D=A1B1. Bob computes the additive share secret as β=r+D2 and sends c2 to Alice.

  • Alice decrypts c2 and computes Alice’s secret share α=Decc22=A2B2+r2.

Correctness Proof: 

   α+β=A2B2+r2+r+D2=A2B2+r2+A1B1+r2=A1B1A2B22=a1+a2b1+b2a1a2b1b22=a1b2+a2b1 (5)

Implementing the above protocol involves only nn1 homomorphic encryption operations, nn12 decryption operations, and nn1 rounds of communication. By incorporating the finite-domain addition and division (which can also be achieved by the inverse of multiplication) computations at a lower cost, the cost is reduced significantly.

3.6. Scheme Correctness

The correctness of our scheme can be proved as follows:

  ds=P1i=0t1dsi=P1i=0t1δi1i=0t1γihP1=P1i=0t1kiγi+ijαij+ijβij1i=0t1γihP1=P1i=0t1kij=0t1γj1i=0t1γihP1=P1i=0t1ki1hP1=P1i=0t1λiki+ht1hP1=P1k1hP1=P1msk+h1hP1=mskmsk+hP1 (6)

3.7. Security Analysis

In the absence of the master private key (msk), the challenger can forge a legitimate user signature private key (ds) for the user ID in polynomial time, which is negligible in probability.

Theorem 1. 

Supposing a random oracle, if the τ-BCAA1 assumption is hard, then our scheme is secure in the EUF-CIA model.

Proof: 

If there exists an adversary A that wins the EUF-CIA model under our distributed SM9 signature private key generation algorithm with advantage ϵ and A performs at most qE>0 distributed extract query and qH>0 H1 query, then we can construct a simulator S to solve the τ-BCAA1 problem with advantage ϵeqH. S simulates honest KGCs and Combine Center based on τ-BCAA1 assumption instance. To make this security certificate more representative, we assume that the semi-honest KGCs number fixed by an adversary is A=t1 and S simulates only one KGC.

  1. Setup

    S and A co-run the distributed setup algorithm

    • (a)

      S and A obtain the generators P1,P2 of the cyclic group G1,G2 of the system parameters and Paillier key pair pki,skI, respectively.

    • (b)

      A adaptively randomly chooses siRZN* as mskI, iA, sends fixj to corresponding KGCs and broadcast commits CI,j, which CI,0=mpki.

    • (c)

      S simulates KGC, computes mpkS=αP2Ci0=CS,0 as master public key share, then randomly chooses rjRZN*j1,t1 and sends rj to KGCiiA.

    • (d)
      S simulates coefficients commits,
      x11      x12x1t1x21      x22 x2t1xt11      xt12xt1t1CS,1Cs,2Cs,t1=r1P2mpkSr2P2mpkSrt1P2mpkS

    The matrix in the above equation is a Vandermonde matrix. Obviously the determinant is not equal to 0, and the elliptic curve points are capable of addition, subtraction and number multiplication operations, so that CS,ii1,t1 can be found by the above equation, S broadcasts CS,i to open Feldman Commit.

    • (e)

      adversary can compute mpk=Ci,0=αP2.

  2. H1 query
    • (a)
      S maintains a list H1list of tuples (IDI,yI,Di) as explained below. When A makes H1 query on IDI that are adaptively chosen by itself, S responds as follows:
    • (b)
      If IDI is on the list H1list of tuples (IDI,yI,Di), S responds with H1IDi=yi. Otherwise, if the query is on the I-th distinct ID, then S stores (IDI,h0,).
    • (c)
      Otherwise, S selects a random integer hi0<iτ from the τ-BCAA1 instance and the instance has been not been chosen by S, then S stores tuple (IDI,hI,[αhi+α]P1) and responds with H1IDi=hi.
  3. Distributed private key extract query
    • (a)
      A runs Distributed Private Key Extract algorithms and Combine Private Key algorithms with S,S selects a random integer kSRZN* as t threshold-private key share.
    • (b)
      A makes private key extract queries on identities IDI that are adaptively chosen, S responds as follows:
    • (c)
      If i=I, then S aborts the game. Otherwise, if iI, then there is a tuple (IDI,hI,[αhi+α]P1), S responds with dsS where dsS=P1dsiAαhi+αP1.
  4. Forgery

A outputs forged distributed private key shares dsi0,t1 on IDi. If iI, then S aborts the game. Otherwise, if i=I, S computes  ds=P1dsi0,t1 and outputs eds,P2 as a solution of τ-BCAA1 instance. □

Claim 1. 

If S does not abort during the simulation, then algorithm A’s view is identical to its view in real attack.

Proof: 

S’s responses to H1  queries are random selections of the τ-BCAA1 instance. S’s responses to distributed private key queries are valid private key shares of ID which are adaptively chosen by A. Those responses are uniformly independently distributed as in a real attack. □

Claim 2. 

If the advantage ϵ of winning the game is the probability of returning valid forged private key shares dsi0,t1, then S is able to solve τ-BCAA1 problem with advantage ϵeqH.

Proof: 

The success of S in resolving τ-BCAA1 problem is determined by the following three events:

Event1: S does not abort during the Distributed Private Key Extract query.

Event2: A forges valid private key shares dsi0,t1 on ID.

Event3: Event2 occurs and index of the tuple (IDi,yi,Di) corresponding to the ID is i=I.

PrEvent1 = 11qEqE,

PrEvent2Event1 = ϵ

PrEvent3Event1Event2 = 1qH

Thus, the advantage of S in solving τ-BCAA1 problem is as follows:

AdvSτBCAA1=PrEvent1Event3=PrEvent1PrEvent2Event1PrEvent3Event1Event2=11qEqE1qHϵϵeqH

4. Performance Evaluation

4.1. Theoretical Analysis

Our scheme enhances the original homomorphic share transformation protocol, with a focus on achieving substantial improvements in computational and communication efficiency. The following table shows the main system cost after invoking various share transformation protocols when t KGCs perform DKG.

The original scheme in Table 2 is based on the study by Tu et al. [30]. Here, we highlight some critical details of the proposed scheme. Following the SM9 digital signature algorithm specifications, we selected a 256-bit prime number as the cyclic group’s order. This guarantees multiplicative inverses for all coefficients in the cyclic group, thereby facilitating the integration of Shamir’s secret sharing into our scheme. However, in the Paillier share conversion protocol, the computation involves number mZn, where n is the product of two primes p and q, which do not directly correspond to the cyclic group’s order N in the SM9 algorithm. To prevent computational errors due to cyclic group order discrepancies, p and q in the Paillier protocol are selected as 257-bit primes, exceeding twice N’s size. The choice is pivotal, as both Paillier protocols necessitate homomorphic multiplication and addition, i.e., EncabEncc=Encab+c for a,b,cRZN. Consequently, n is a 514-bit, and the Paillier ciphertext is a 1028-bit random number. Table 2 shows that in the original scheme, each of t KGCs performs t Paillier encryptions, stores ciphertexts (1028 bits) and plaintexts (256 bits), receives t − 1 ciphertexts, and conducts decryption. Implementing the Paillier protocol yields t − 1 intermediate variable rRZN (256 bits), necessitating a storage total of 2t22t1028 bits+2t2t256 bits in the original protocol. Beyond computational overhead, each KGC executes t − 1 homomorphic additions and multiplications, incurring a computational cost of t2TEnc+t2tTDec+t2tTHomAdd+t2tTHomMul. In our improvement scheme, t KGCs undertake (t + 1)/2 Paillier encryptions and store ciphertexts (1028 bits) and plaintexts, and the latter is computed from a 256-bit constant and a random number. Additionally, they obtain (t − 1)/2 ciphertexts and a 256-bit random number, with the Paillier protocol generating (t − 1)/2 intermediates r for storage, culminating in a total of 2t2+t21028 bits+2t2256 bits storage in the enhanced scheme. Exceeding the aforementioned computational cost, each KGC conducts (t − 1)/2 homomorphic additions and multiplications, accruing a total cost of t2+t2TEnc+t2t2TDec+t2t2THomAdd+t2t2THomMul, where TEnc denotes the encryption operation time, TDec denotes the decryption operation time, THomAdd denotes the homomorphic addition operation time, and THomMul denotes the homomorphic multiplication operation time. From Table 2, it can be observed that our scheme has significantly improved storage space, computational time overhead, and communication rounds compared to the original scheme.

Table 2.

Comparison of system cost.

Scheme Storage Space (bits) Computational Time Communication Rounds
Original scheme 2t22t1028 bits+2t2t256 bits t2TEnc+t2tTDec+t2tTHomAdd+t2tTHomMul t2t
Improvement scheme 2t2+t21028 bits+2t2256 bits t2+t2TEnc+t2t2TDec+t2t2THomAdd+t2t2THomMul t2t2

4.2. Experimental Analysis

Experimental validation for this study was conducted using a computer with a 3.0 GHz 6-core 64-bit AMD Ryzen 5 4600H processor and 16 GB of RAM, operating on a Windows 10 platform. The experimental design employed the Java Pairing-Based Cryptography (JPBC) library, adhering to the stringent SM9 standard recommendations for algorithm parameters. This adherence is pivotal, as it ensures that our findings hold practical significance in the field of the identification and verification of cryptographic algorithms. As shown in Figure 3 and Table 3, by simulating the operational environment, the experiments were designed to emulate the implementation of multiple KGCs as part of a DKG system. The empirical evidence gleaned from these simulations offers a robust corroboration of the theoretical performance analysis previously detailed in this study. The results unambiguously affirm that our improved scheme aligns with theoretical predictions and provides a considerable enhancement in performance when compared to the original scheme.

Figure 3.

Figure 3

Comparison of scheme time consumption.

Table 3.

Comparison of scheme time consumption.

Scheme
Number of KGCs
Original Scheme Improvement Scheme
5 82 ms 44 ms
10 365 ms 207 ms
15 768 ms 390 ms
20 1358 ms 721 ms
25 1909 ms 1087 ms
30 2781 ms 1536 ms
35 3767 ms 1957 ms
40 4842 ms 2437 ms
45 6009 ms 3086 ms
50 7212 ms 3850 ms
100 28,970 ms 14,441 ms

The graphical data presented below detail a side-by-side comparison of the “Original Scheme” and “Improved Scheme” with an increasing number of KGCs. The original scheme is illustrated by an orange dashed trajectory, revealing a pronounced upward trend in computational time, which suggests scalability concerns. Conversely, the “Improved Scheme”, depicted by a steady blue line, indicates a tempered ascent in time with additional KGCs, illustrating a more scalable solution. The tabular data echo the graphical insights, clearly quantifying the differences in milliseconds (ms) across a spectrum of 5–100 KGCs, which reinforces the performance benefits of the improved scheme.

Notably, the combination of both graphical and tabular data encapsulated within these images provides a transparent and quantifiable assessment of the efficacy of the cryptographic schemes in question. The enhancement offered by the refined scheme is substantial, setting a new benchmark for system efficiency and scalability in cryptographic practices.

5. Conclusions

To address the challenges posed by the prohibitive cost of DKG within the SM9 framework, this study introduces an optimized approach called the SM9-based Lightweight Distributed Key Generation Scheme, which operates effectively in the absence of trusted centers. Through rigorous analysis, we successfully demonstrated the robust security credentials of the scheme within the EUF-CIA model, substantiating its resilience by demonstrating a reduction in the τ-BCAA1 problem under the random oracle model. Empirical evaluations further underscore the substantial enhancements in efficiency offered by our scheme, demonstrating a significant step forward in the practical deployment of distributed cryptographic solutions. However, a notable limitation of our proposed scheme is that it is constructed under the assumption of a semi-honest adversary. Future research will explore the utilization of zero-knowledge proofs and related technologies to develop a secure scheme under the assumption of malicious adversaries. This progression will enhance the applicability of our approach in more demanding scenarios where adversarial behavior may compromise security.

Acknowledgments

The financial support mentioned in the Funding part is gratefully acknowledged.

Author Contributions

Conceptualization, X.Z. and J.C.; methodology, J.C.; software, Y.M.; validation, W.F.; formal analysis, W.F.; investigation, W.F; resources, Y.M.; data curation, Y.M.; writing—original draft preparation, J.C.; writing—review and editing, X.Z.; visualization, W.F.; supervision, W.F.; project administration, X.Z.; funding acquisition, W.F. All authors have read and agreed to the published version of the manuscript.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Funding Statement

This work was supported by National Natural Science Foundation of China (Grant No. 62276273) and Science and Technology Research Project of Jiangxi Provincial Department of Education (GJJ2405006).

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

  • 1.Lynn T., Rosati P., Endo P.T. Toward the intelligent internet of everything: Observations on multidisciplinary challenges in intelligent systems research. Technol. Sci. Cult. 2018;116:52–64. doi: 10.5772/intechopen.83691. [DOI] [Google Scholar]
  • 2.Hahn D., Munir A., Behzadan V. Security and privacy issues in intelligent transportation systems: Classification and challenges. IEEE Intell. Transp. Syst. Mag. 2019;13:181–196. doi: 10.1109/MITS.2019.2898973. [DOI] [Google Scholar]
  • 3.Alabdulatif A., Thilakarathne N.N. A novel cloud-enabled cyber threat hunting platform for evaluating the cyber risks associated with smart health ecosystems. Appl. Sci. 2024;14:9567. doi: 10.3390/app14209567. [DOI] [Google Scholar]
  • 4.Chowdhury R.H. Intelligent systems for healthcare diagnostics and treatment. World J. Adv. Res. Rev. 2024;23:007–015. doi: 10.30574/wjarr.2024.23.1.2015. [DOI] [Google Scholar]
  • 5.Huda N.U., Ahmed I., Adnan M., Ali M., Naeem F. Experts and intelligent systems for smart homes’ transformation to sustainable smart cities: A comprehensive review. Expert Syst. Appl. 2024;238:122380. doi: 10.1016/j.eswa.2023.122380. [DOI] [Google Scholar]
  • 6.Egerson J.I., Williams M., Aribigbola A., Okafor M., Olaleye A. Cybersecurity strategies for protecting big data in business intelligence systems: Implication for operational efficiency and profitability. World J. Adv. Res. Rev. 2024;23:916–924. doi: 10.30574/wjarr.2024.23.2.2390. [DOI] [Google Scholar]
  • 7.Ogborigbo J.C., Sobowale O.S., Amienwalen E.I., Owoade Y., Samson A.T., Egerson J. Strategic integration of cybersecurity in business intelligence systems for data protection and competitive advantage. World J. Adv. Res. Rev. 2024;23:081–096. doi: 10.30574/wjarr.2024.23.1.1900. [DOI] [Google Scholar]
  • 8.Pedersen T.P. A Threshold Cryptosystem without a Trusted Party. In: Davies D.W., editor. Advances in Cryptology—EUROCRYPT ’91. Springer; Berlin/Heidelberg, Germany: 1991. pp. 522–526. [DOI] [Google Scholar]
  • 9.Gennaro R., Jarecki S., Krawczyk H., Rabin T. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. J. Cryptol. 2007;20:51–83. doi: 10.1007/s00145-006-0347-3. [DOI] [Google Scholar]
  • 10.Gennaro R., Jarecki S., Krawczyk H., Rabin T. Secure Applications of Pedersen’s Distributed Key Generation Protocol. In: Joye M., editor. Topics in Cryptology—CT-RSA 2003. Springer; Berlin/Heidelberg, Germany: 2003. pp. 373–390. [DOI] [Google Scholar]
  • 11.Schnorr C.P. Efficient Identification and Signatures for Smart Cards; Proceedings of the CRYPTO’89; Santa Barbara, CA, USA. 1989. pp. 239–252. [DOI] [Google Scholar]
  • 12.Kate A., Goldberg I. Distributed Key Generation for the Internet; Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems; Montreal, QC, Canada. 22–26 June 2009; pp. 119–128. [DOI] [Google Scholar]
  • 13.Fouque P.-A., Stern J. One Round Threshold Discrete-Log Key Generation without Private Channels. In: Kim K., editor. Public Key Cryptography. Springer; Berlin/Heidelberg, Germany: 2001. pp. 300–316. [DOI] [Google Scholar]
  • 14.Zhang R., Imai H. Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. In: Zhou J., Yung M., Han Y., editors. Applied Cryptography and Network Security. Springer; Berlin/Heidelberg, Germany: 2003. pp. 96–110. [DOI] [Google Scholar]
  • 15.Canny J., Sorkin S. Practical Large-Scale Distributed Key Generation. In: Cachin C., Camenisch J.L., editors. Advances in Cryptology—EUROCRYPT 2004. Springer; Berlin/Heidelberg, Germany: 2004. pp. 138–152. [DOI] [Google Scholar]
  • 16.Zhang F.-T., Wang Y.-M. Distributed Key Generation Based on Generalized Verifiable Secret Sharing. [(accessed on 5 December 2024)];Acta Electron. Sin. 2003 31:580–584. Available online: https://www.ejournal.org.cn/CN/Y2003/V31/I4/580. [Google Scholar]
  • 17.Zhang F.-T. Distributed Key Generation Based on Vector Space Access Structures. [(accessed on 5 December 2024)];Acta Electron. Sin. 2005 33:816–819. Available online: https://www.ejournal.org.cn/CN/Y2005/V33/I5/816. [Google Scholar]
  • 18.Zha J., Su J., Yan J.H. Adaptive Distributed Key Generation Scheme. Comput. Eng. 2010;36:161–162+170. [Google Scholar]
  • 19.Zhang J., Zhang F. Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups; Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems; Xi’an, China. 9–11 September 2013; pp. 803–808. [DOI] [Google Scholar]
  • 20.Wang H., Li J., Cui Q. Military Equipment’s Distributed Key-generating Algorithm for Identity-based Cryptography. [(accessed on 8 December 2024)];Comput. Sci. 2016 43:355–357. Available online: https://www.jsjkx.com/EN/Y2016/V43/IZ11/355. [Google Scholar]
  • 21.Lindell Y., Nof A. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody; Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security; Toronto, ON, Canada. 15–19 October 2018; pp. 1837–1854. [DOI] [Google Scholar]
  • 22.Gennaro R., Goldfeder S. Fast Multiparty Threshold ECDSA with Fast Trustless Setup; Proceedings of the ACM SIGSAC Conference on Computer and Communications Security; Toronto, ON, Canada. 15–19 October 2018; pp. 1179–1194. [DOI] [Google Scholar]
  • 23.Shamir A. Identity-Based Cryptosystems and Signature Schemes. In: Blakley G.R., Chaum D., editors. Advances in Cryptology. Springer; Berlin/Heidelberg, Germany: 1985. pp. 47–53. [DOI] [Google Scholar]
  • 24.Wang Y. Master’s Thesis. Beijing Jiaotong University; Beijing, China: 2021. Application Research Based on SM9 Digital Signature Algorithm. [DOI] [Google Scholar]
  • 25.Zhang R., Zou H., Zhang C., Xiao Y., Tao Y. Proceedings of the Information Security and Cryptology—Proceedings of the16th International Conference, Inscrypt 2020, Guangzhou, China, 11–14 December 2020. Springer Nature Switzerland AG; Cham, Switzerland: 2021. Distributed Key Generation for SM9-Based Systems; pp. 113–129. [DOI] [Google Scholar]
  • 26.Identity-Based Cryptographic Algorithms SM9. [(accessed on 5 December 2024)];2016 Available online: http://www.sca.gov.cn/sca/xxgk/2016-03/28/content_1002407.shtml.
  • 27.Wang Z. Master’s Thesis. Beijing University of Posts and Telecommunications; Beijing, China: 2023. Research on the Fast Implementation Method of National Secret SM9 Software. [DOI] [Google Scholar]
  • 28.Ma T. Master’s Thesis. Nanjing Normal University; Nanjing, China: 2020. Research on SM9 Threshold Cipher Algorithm. [DOI] [Google Scholar]
  • 29.Tu B.B., Wang X.F., Zhang L.T. Two Distributed Applications of SM2 and SM9. J. Cryptologic Res. 2020;7:826–838. doi: 10.13868/j.cnki.jcr.000409. [DOI] [Google Scholar]
  • 30.Yu Y.Y., Li Z.H., Tu F. Distributed Identification Cryptographic Management Based on Blockchain. Appl. Electron. Tech. 2023;49:98–102. doi: 10.16157/j.issn.0258-7998.223507. [DOI] [Google Scholar]

Associated Data

This section collects any data citations, data availability statements, or supplementary materials included in this article.

Data Availability Statement

The data are contained within the article.


Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES