• BS ISO/IEC 9796-3:2006

    Current The latest, up-to-date edition.

    Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms

    Available format(s):  Hardcopy, PDF

    Language(s):  English

    Published date:  28-02-2014

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols, notation and conventions
    5 Binding between signature mechanisms
       and hash-functions
    6 Framework for digital signatures giving
       message recovery
    7 General model for digital signatures giving
       message recovery
    8 NR (Nyberg-Rueppel message recovery
       signature)
    9 ECNR (Elliptic Curve Nyberg-Rueppel message
       recovery signature)
    10 ECMR (Elliptic Curve Miyaji message recovery
       signature)
    11 ECAO (Elliptic Curve Abe-Okamoto message
       recovery signature)
    12 ECPV (Elliptic Curve Pintsov-Vanstone message
       recovery signature)
    13 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel
       message recovery signature)
    Annex A (informative) - Mathematical conventions
    Annex B (normative) - Conversion functions
    Annex C (normative) - Mask generation functions (Key
            derivation functions)
    Annex D (informative) - Example method for producing
            the data input
    Annex E (normative) - ASN.1 module
    Annex F (informative) - Numerical examples
    Annex G (informative) - Summary of properties of
            mechanisms
    Annex H (informative) - Correspondence of schemes
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines six digital signature schemes giving message recovery and specifies an optional control field in the hash-token, which can provide added security to the signature.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/2
    Development Note Supersedes 04/30117200 DC. (10/2006)
    Document Type Standard
    Publisher British Standards Institution
    Status Current
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective