Research Article

Efficient Secure Computation from SM Series Cryptography

Figure 6

SM2 key agreement protocol with optional key confirmation. The parties and share the elliptic curve system parameters ; the public keys ; the identifier hash values ; and the output key length.