INCITS/ISO/IEC 18014-3 : 2010
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS
Hardcopy , PDF
18-12-2020
English
01-01-2010
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 General discussion
5 Operations
5.1 Linking
5.2 Aggregation
5.3 Publishing
6 Data structures
6.1 Object identifiers
6.2 Node
6.3 Link
6.4 Chain
6.5 BindingInfo
6.6 Extensions
6.6.1 Request and Token extensions
6.6.2 BindingInfo extensions
7 Time-stamp request
8 Time-stamp response
8.1 DigestedData encapsulation
8.2 SignedData encapsulation
9 Time-stamp verification
Annex A (normative) ASN.1 Module for time-stamping
Annex B (normative) Additional Discussion
B.1 Discussion
B.2 Linking
B.2.1 Linear chain linking
B.2.2 Anti-monotone binary linking
B.2.3 Threaded tree linking
B.3 Aggregation
B.3.1 Unity aggregation
B.3.2 Merkle tree aggregation
B.3.3 One-way accumulator aggregation
B.4 Publishing
B.4.1 No publishing
B.4.2 Single link publishing
B.4.3 Merkle tree publishing
Annex C (informative) Data structures
C.1 Time-stamps using DigestedData encapsulation
C.2 Time-stamps using SignedData encapsulation
C.3 Linear Chain Linking with Merkle Tree Aggregation
Bibliography
Defines a general model for time-stamping services producing linked tokens.
DocumentType |
Standard
|
Pages |
44
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 18014-3:2009 | Identical |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9594-8:2017 | Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks |
ISO/IEC 18014-1:2008 | Information technology Security techniques Time-stamping services Part 1: Framework |
ISO/IEC 11770-3:2015 | Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.