M00026994
New product
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 2: MECHANISMS USING A GROUP PUBLIC KEY
International Organization for Standardization
In stock
Warning: Last items in stock!
Availability date: 11/05/2021
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols (and abbreviated terms)
5 General model and requirements
6 Mechanisms with linking capability
7 Mechanisms with opening capability
8 Mechanisms with both opening and linking capabilities
Annex A (normative) - Object identifiers
Annex B (normative) - Special hash-functions
Annex C (informative) - Security guidelines for the anonymous
signature mechanisms
Annex D (informative) - Comparison of revocation mechanisms
Annex E (informative) - Numerical examples
Annex F (informative) - Proof of correct generation in
Mechanism 5
Bibliography
Describes anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
Published | |
Document Type | Standard |
Status | Current |
Publisher | International Organization for Standardization |
ProductNote | THIS STANDARD ALSO HAVE CORRECTED VERSION FOR ENGLISH FOR THE YEAR 2017. |
Pages | |
ISBN | |
Committee | ISO |