M00019915
New product
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 2: MECHANISMS USING A GROUP PUBLIC KEY
British Standards Institution
In stock
Warning: Last items in stock!
Availability date: 11/05/2021
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 General model and requirements
6 Mechanisms with linking capability
7 Mechanisms with opening capability
8 Mechanisms with both opening and
linking capabilities
Annex A (normative) - Object identifiers
Annex B (normative) - Special hash-functions
Annex C (informative) - Security guidelines
for the anonymous signature mechanisms
Annex D (informative) - Comparison of revocation
mechanisms
Annex E (informative) - Numerical examples
Annex F (informative) - Proof of correct
generation in Mechanism 5
Bibliography
Describes anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
The British Standards InstitutionThis part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.It provides— a general description of an anonymous digital signature mechanism using a group public key, and— a variety of mechanisms that provide such anonymous digital signatures.For each mechanism, this part of ISO/IEC 20008 specifies— the process for generating group member signature keys and a group public key,— the process for producing signatures,— the process for verifying signatures,— the process for opening signatures (if the mechanism supports opening),— the process for linking signatures (if the mechanism supports linking), and— the process for revoking group members.
Published | |
Document Type | Standard |
Status | Current |
Publisher | British Standards Institution |
Pages | |
ISBN | |
Committee | IST/33 |
Supersedes |
|