{"id":372483,"date":"2024-10-20T02:29:30","date_gmt":"2024-10-20T02:29:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-20008-22013a12021\/"},"modified":"2024-10-26T04:20:46","modified_gmt":"2024-10-26T04:20:46","slug":"bs-iso-iec-20008-22013a12021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-20008-22013a12021\/","title":{"rendered":"BS ISO\/IEC 20008-2:2013+A1:2021"},"content":{"rendered":"
This part of ISO\/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.<\/p>\n
It provides<\/p>\n
a general description of an anonymous digital signature mechanism using a group public key, and<\/p>\n<\/li>\n
a variety of mechanisms that provide such anonymous digital signatures.<\/p>\n<\/li>\n<\/ul>\n
For each mechanism, this part of ISO\/IEC 20008 specifies<\/p>\n
the process for generating group member signature keys and a group public key,<\/p>\n<\/li>\n
the process for producing signatures,<\/p>\n<\/li>\n
the process for verifying signatures,<\/p>\n<\/li>\n
the process for opening signatures (if the mechanism supports opening),<\/p>\n<\/li>\n
the process for linking signatures (if the mechanism supports linking), and<\/p>\n<\/li>\n
the process for revoking group members.<\/p>\n<\/li>\n<\/ul>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols (and abbreviated terms) <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 5 General model and requirements <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 Mechanisms with linking capability 6.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6.2 Mechanism 1 6.2.1 Symbols 6.2.2 Key generation process <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2.3 Signature process <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 6.2.4 \u200bVerification process <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 6.2.5 Linking process 6.2.6 Revocation process 6.3 Mechanism 2 6.3.1 Symbols <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 6.3.2 Key generation process <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.3.3 Signature process <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.3.4 \u200bVerification process <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3.5 Linking process 6.3.6 Revocation process <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.4 Mechanism 3 6.4.1 Symbols 6.4.2 Key generation process <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 6.4.3 Signature process <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.4.4 \u200bVerification process <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.4.5 Linking process 6.4.6 Revocation process <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.5 Mechanism 4 6.5.1 Symbols 6.5.2 Key generation process <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.5.3 Signature process 6.5.4 \u200bVerification process <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.5.5 Linking process 6.5.6 Revocation process 7 Mechanisms with opening capability 7.1 General 7.2 Mechanism 5 7.2.1 Symbols <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.2.2 Key generation process <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.2.3 Signature process <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.2.4 \u200bVerification process 7.2.5 Opening process 7.2.6 Revocation process <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.3 Mechanism 6 7.3.1 Symbols 7.3.2 Key generation process <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.3.3 Signature process <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 7.3.4 \u200bVerification process 7.3.5 Opening process 7.3.6 Revocation process 8 Mechanisms with both opening and linking capabilities 8.1 General <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 8.2 Mechanism 7 8.2.1 Symbols 8.2.2 Key generation process <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 8.2.3 Signature process 8.2.4 \u200bVerification process <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 8.2.5 Opening process 8.2.6 Evidence evaluation process 8.2.7 Linking process <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 8.2.8 Revocation process <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | Annex A (normative) Object identifiers <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | Annex B (normative) Special hash-functions <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | Annex C (informative) Security guidelines for the anonymous signature mechanisms <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | Annex D (informative) Comparison of revocation mechanisms <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | Annex E (informative) Numerical examples <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | Annex F (informative) Proof of correct generation in Mechanism 5 <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Anonymous digital signatures – Mechanisms using a group public key<\/b><\/p>\n |