Research Article
Efficient Secure Computation from SM Series Cryptography
Figure 6
SM2 key agreement protocol with optional key confirmation. The parties and share the elliptic curve system parameters ; the public keys ; the identifier hash values ; and the output key length.