BS ISO/IEC 20008-2:2013+A1:2021
$215.11
Information technology. Security techniques. Anonymous digital signatures – Mechanisms using a group public key
Published By | Publication Date | Number of Pages |
BSI | 2021 | 94 |
This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
It provides
-
a general description of an anonymous digital signature mechanism using a group public key, and
-
a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, this part of ISO/IEC 20008 specifies
-
the process for generating group member signature keys and a group public key,
-
the process for producing signatures,
-
the process for verifying signatures,
-
the process for opening signatures (if the mechanism supports opening),
-
the process for linking signatures (if the mechanism supports linking), and
-
the process for revoking group members.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
7 | Foreword |
8 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols (and abbreviated terms) |
11 | 5 General model and requirements |
12 | 6 Mechanisms with linking capability 6.1 General |
13 | 6.2 Mechanism 1 6.2.1 Symbols 6.2.2 Key generation process |
16 | 6.2.3 Signature process |
17 | 6.2.4 Verification process |
18 | 6.2.5 Linking process 6.2.6 Revocation process 6.3 Mechanism 2 6.3.1 Symbols |
19 | 6.3.2 Key generation process |
21 | 6.3.3 Signature process |
22 | 6.3.4 Verification process |
23 | 6.3.5 Linking process 6.3.6 Revocation process |
24 | 6.4 Mechanism 3 6.4.1 Symbols 6.4.2 Key generation process |
25 | 6.4.3 Signature process |
26 | 6.4.4 Verification process |
27 | 6.4.5 Linking process 6.4.6 Revocation process |
28 | 6.5 Mechanism 4 6.5.1 Symbols 6.5.2 Key generation process |
30 | 6.5.3 Signature process 6.5.4 Verification process |
31 | 6.5.5 Linking process 6.5.6 Revocation process 7 Mechanisms with opening capability 7.1 General 7.2 Mechanism 5 7.2.1 Symbols |
32 | 7.2.2 Key generation process |
33 | 7.2.3 Signature process |
34 | 7.2.4 Verification process 7.2.5 Opening process 7.2.6 Revocation process |
35 | 7.3 Mechanism 6 7.3.1 Symbols 7.3.2 Key generation process |
36 | 7.3.3 Signature process |
37 | 7.3.4 Verification process 7.3.5 Opening process 7.3.6 Revocation process 8 Mechanisms with both opening and linking capabilities 8.1 General |
38 | 8.2 Mechanism 7 8.2.1 Symbols 8.2.2 Key generation process |
40 | 8.2.3 Signature process 8.2.4 Verification process |
41 | 8.2.5 Opening process 8.2.6 Evidence evaluation process 8.2.7 Linking process |
42 | 8.2.8 Revocation process |
43 | Annex A (normative) Object identifiers |
45 | Annex B (normative) Special hash-functions |
47 | Annex C (informative) Security guidelines for the anonymous signature mechanisms |
50 | Annex D (informative) Comparison of revocation mechanisms |
53 | Annex E (informative) Numerical examples |
88 | Annex F (informative) Proof of correct generation in Mechanism 5 |
92 | Bibliography |