• BS ISO/IEC 18370-2:2016

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms

    Available format(s): 

    Language(s): 

    Published date:  31-07-2016

    Publisher:  British Standards Institution

    Sorry this product is not available in your region.

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols
    5 General requirements
    6 Blind signature mechanisms
    7 Blind signature mechanisms with partial disclosure
    8 Blind signature mechanisms with selective disclosure
    9 Traceable blind signature mechanisms
    Annex A (normative) - Object identifiers
    Annex B (normative) - Conversion functions
    Annex C (normative) - Group description
    Annex D (informative) - Special hash-functions
    Annex E (informative) - Security considerations and comparison
            of blind signature mechanisms
    Annex F (informative) - Numerical examples
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 15/30268565 DC. (07/2016)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 18370-1:2016 Information technology Security techniques Blind digital signatures Part 1: General
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
    ISO/IEC 9796:1991 Information technology Security techniques Digital signature scheme giving message recovery
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective