M00028969
New product
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
International Organization for Standardization
In stock
Warning: Last items in stock!
Availability date: 11/05/2021
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Notation, symbols and abbreviated terms
4 Mechanisms based on identities
5 Mechanisms based on integer factorization
6 Mechanisms based on discrete logarithms with respect
to prime numbers
7 Mechanisms based on discrete logarithms with respect
to composite numbers
8 Mechanisms based on asymmetric encryption systems
9 Mechanism based on discrete logarithms with respect
to elliptic curves
Annex A (normative) - Object identifiers
Annex B (informative) - Principles of zero-knowledge techniques
Annex C (informative) - Guidance on parameter choice and
comparison of the mechanisms
Annex D (informative) - Numerical examples
Bibliography
Describes entity authentication mechanisms using zero-knowledge techniques: - mechanisms based on identities and providing unilateral authentication; - mechanisms based on integer factorization and providing unilateral authentication; - mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication; - mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication; - mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
Published | |
Document Type | Standard |
Status | Current |
Publisher | International Organization for Standardization |
Pages | |
ISBN | |
Committee | JTC 1 |