Research Article

Provably-Secure (Chinese Government) SM2 and Simplified SM2 Key Exchange Protocols

Table 1

SM2 key exchange protocol.


Randomly selects Randomly selects
Computes Computes
Computes Computes
Computes Computes
Computes
Computes
Computes
Computes
Computes
Computes
Computes
Computes
Verifies
Computes
Computes
Verifies
Key established Key established
SID is () or () in the case where key confirmation is required.