BS ISO/IEC 15946-4:2004
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
Information technology. Security techniques. Cryptographic techniques based on elliptic curves Digital signatures giving message recovery
Hardcopy , PDF
01-04-2008
English
07-10-2004
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
4.1 Symbols and notation
4.2 Coding convention, length and field size
4.3 Legend for figures
5 Processes
5.1 Parameter Generation Process
5.2 Signature Generation Process
5.3 Signature Verification Process
6 General Model for Digital Signatures giving message recovery
6.1 Requirements
6.2 Summary of Functions and Procedures
6.3 Signature generation process
6.4 Signature verification process
7 ECNR (Elliptic Curve Nyberg-Rueppel message recovery
signature)
7.1 Domain and User Parameters
7.2 Signature Generation Process
7.3 Signature Verification Process
8 ECMR (Elliptic Curve Miyaji message Recovery signature)
8.1 Domain and User Parameters
8.2 Signature Generation Process
8.3 Signature Verification Process
9 ECAO (Elliptic Curve Abe-Okamoto message recovery
signature)
9.1 Domain and User Parameters
9.2 Signature Generation Process
9.3 Signature Verification Process
10 ECPV (Elliptic Curve Pintsov-Vanstone message recovery
signature)
10.1 Domain and User Parameters
10.2 Signature Generation Process
10.3 Signature Verification Process
11 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel message
recovery signature)
11.1 Domain and User Parameters
11.2 Signature Generation Process
11.3 Signature Verification Process
Annex A (informative) Numerical examples
Annex B (informative) Summary of properties of mechanisms
Annex C (informative) Information about patents
Bibliography
Specifies public-key cryptographic techniques based on elliptic curves. These techniques include methods for the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.
Committee |
IST/33
|
DevelopmentNote |
Supersedes 02/652466 DC. (10/2004)
|
DocumentType |
Standard
|
Pages |
56
|
PublisherName |
British Standards Institution
|
Status |
Withdrawn
|
Supersedes |
Standards | Relationship |
ISO/IEC 15946-4:2004 | Identical |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.