BS ISO/IEC 9796-3:2006
Current
The latest, up-to-date edition.
Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms
Hardcopy , PDF
English
28-02-2014
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, notation and conventions
5 Binding between signature mechanisms
and hash-functions
6 Framework for digital signatures giving
message recovery
7 General model for digital signatures giving
message recovery
8 NR (Nyberg-Rueppel message recovery
signature)
9 ECNR (Elliptic Curve Nyberg-Rueppel message
recovery signature)
10 ECMR (Elliptic Curve Miyaji message recovery
signature)
11 ECAO (Elliptic Curve Abe-Okamoto message
recovery signature)
12 ECPV (Elliptic Curve Pintsov-Vanstone message
recovery signature)
13 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel
message recovery signature)
Annex A (informative) - Mathematical conventions
Annex B (normative) - Conversion functions
Annex C (normative) - Mask generation functions (Key
derivation functions)
Annex D (informative) - Example method for producing
the data input
Annex E (normative) - ASN.1 module
Annex F (informative) - Numerical examples
Annex G (informative) - Summary of properties of
mechanisms
Annex H (informative) - Correspondence of schemes
Bibliography
Defines six digital signature schemes giving message recovery and specifies an optional control field in the hash-token, which can provide added security to the signature.
Committee |
IST/33/2
|
DevelopmentNote |
Supersedes 04/30117200 DC. (10/2006)
|
DocumentType |
Standard
|
Pages |
82
|
PublisherName |
British Standards Institution
|
Status |
Current
|
Supersedes |
Standards | Relationship |
ISO/IEC 9796-3:2006 | Identical |
ISO/IEC 15946-1:2016 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 15946-5:2017 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation |
ANSI X9.63 : 2011 | FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.