Shopping Cart

No products in the cart.

BS ISO/IEC 20008-2:2013+A1:2021

$215.11

Information technology. Security techniques. Anonymous digital signatures – Mechanisms using a group public key

Published By Publication Date Number of Pages
BSI 2021 94
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.

It provides

  • a general description of an anonymous digital signature mechanism using a group public key, and

  • a variety of mechanisms that provide such anonymous digital signatures.

For each mechanism, this part of ISO/IEC 20008 specifies

  • the process for generating group member signature keys and a group public key,

  • the process for producing signatures,

  • the process for verifying signatures,

  • the process for opening signatures (if the mechanism supports opening),

  • the process for linking signatures (if the mechanism supports linking), and

  • the process for revoking group members.

PDF Catalog

PDF Pages PDF Title
2 undefined
7 Foreword
8 Introduction
9 1 Scope
2 Normative references
3 Terms and definitions
10 4 Symbols (and abbreviated terms)
11 5 General model and requirements
12 6 Mechanisms with linking capability
6.1 General
13 6.2 Mechanism 1
6.2.1 Symbols
6.2.2 Key generation process
16 6.2.3 Signature process
17 6.2.4 ​Verification process
18 6.2.5 Linking process
6.2.6 Revocation process
6.3 Mechanism 2
6.3.1 Symbols
19 6.3.2 Key generation process
21 6.3.3 Signature process
22 6.3.4 ​Verification process
23 6.3.5 Linking process
6.3.6 Revocation process
24 6.4 Mechanism 3
6.4.1 Symbols
6.4.2 Key generation process
25 6.4.3 Signature process
26 6.4.4 ​Verification process
27 6.4.5 Linking process
6.4.6 Revocation process
28 6.5 Mechanism 4
6.5.1 Symbols
6.5.2 Key generation process
30 6.5.3 Signature process
6.5.4 ​Verification process
31 6.5.5 Linking process
6.5.6 Revocation process
7 Mechanisms with opening capability
7.1 General
7.2 Mechanism 5
7.2.1 Symbols
32 7.2.2 Key generation process
33 7.2.3 Signature process
34 7.2.4 ​Verification process
7.2.5 Opening process
7.2.6 Revocation process
35 7.3 Mechanism 6
7.3.1 Symbols
7.3.2 Key generation process
36 7.3.3 Signature process
37 7.3.4 ​Verification process
7.3.5 Opening process
7.3.6 Revocation process
8 Mechanisms with both opening and linking capabilities
8.1 General
38 8.2 Mechanism 7
8.2.1 Symbols
8.2.2 Key generation process
40 8.2.3 Signature process
8.2.4 ​Verification process
41 8.2.5 Opening process
8.2.6 Evidence evaluation process
8.2.7 Linking process
42 8.2.8 Revocation process
43 Annex A (normative) Object identifiers
45 Annex B (normative) Special hash-functions
47 Annex C (informative) Security guidelines for the anonymous signature mechanisms
50 Annex D (informative) Comparison of revocation mechanisms
53 Annex E (informative) Numerical examples
88 Annex F (informative) Proof of correct generation in Mechanism 5
92 Bibliography
BS ISO/IEC 20008-2:2013+A1:2021
$215.11