计算机工程与应用 ›› 2025, Vol. 61 ›› Issue (5): 18-31.DOI: 10.3778/j.issn.1002-8331.2408-0245

• 热点与综述 • 上一篇    下一篇

SM9身份认证方案及其应用研究综述

陈泽宇,刘丽华,王尚平   

  1. 1.陕西理工大学 数学与计算机科学学院,陕西 汉中 723000
    2.西安理工大学 理学院,西安 710048
  • 出版日期:2025-03-01 发布日期:2025-03-01

Review of SM9 Identity Authentication Schemes and Their Applications

CHEN Zeyu, LIU Lihua, WANG Shangping   

  1. 1.School of Mathematics and Computer Science, Shaanxi University of Technology, Hanzhong, Shaanxi 723000, China
    2.School of Science, Xi’an University of Technology, Xi’an 710048, China
  • Online:2025-03-01 Published:2025-03-01

摘要: 商用密码是我国密码体系的重要组成部分,奠定了国家安全的基石。SM9算法因其无须证书、易于管理和低总体成本而广泛应用于身份认证领域。概述了SM9算法的整体框架和关键技术并与同类算法进行比较,探讨了其身份认证方案,特别是在盲签名、否认认证签名、环签名和属性签名的研究进展。重点梳理了SM9算法在区块链安全领域的应用,包括隐私保护、智能合约和跨域认证等场景,以及在物联网安全领域的应用,即工业物联网、电力物联网和车联网安全中的方案特点。最后,从多维度分析了SM9算法在身份认证应用中的安全性,为算法评估和优化提供了新的思路。

关键词: SM9算法, 身份认证, 区块链安全, 物联网安全, 车联网安全

Abstract: Commercial cryptography is essential to China’s cryptographic framework, serving as the foundation for national security. The SM9 algorithm is widely used in the field of identity authentication, due to its certificate free nature, ease of management, and low overall cost. The overall framework and key technologies of the SM9 algorithm are summarized and compared with similar algorithms. The progress of its identity authentication scheme, particularly in blind signatures, denial authentication signatures, ring signatures, and attribute signatures, is discussed. The application of the SM9 algorithm in the field of blockchain security is highlighted, including scenarios such as privacy enhancement, facilitation of smart contracts, and cross-domain authentication, as well as its application in the field of Internet of things (IoT) security, that is, the scheme characteristics of industrial IoT, power IoT, and Internet of vehicles (IoV) security. Finally, the multidimensional analysis of security of SM9 algorithm in identity authentication is analyzed, which provides a new idea for algorithm evaluation and optimization.

Key words: SM9 algorithm, identity authentication, blockchain security, IoT security, IoV security