Research Article
Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols
Table 1
SM2 key exchange protocol.
| | | | |
| Randomly selects | Randomly selects | Computes | Computes | Computes | Computes | Computes | Computes | | | Computes | | Computes | | Computes | | Computes | | Computes | | Computes | | Computes | | Computes | | Verifies | | Computes | | | | Computes | | Verifies | Key established | Key established |
SID is () or () in the case where key confirmation is required. |
|
|