• INCITS/ISO/IEC 18014-3 : 2010

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS

    Available format(s):  Hardcopy, PDF

    Superseded date:  18-12-2020

    Language(s):  English

    Published date:  01-01-2010

    Publisher:  Information Technology Industry Council

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 General discussion
    5 Operations
      5.1 Linking
      5.2 Aggregation
      5.3 Publishing
    6 Data structures
      6.1 Object identifiers
      6.2 Node
      6.3 Link
      6.4 Chain
      6.5 BindingInfo
      6.6 Extensions
          6.6.1 Request and Token extensions
          6.6.2 BindingInfo extensions
    7 Time-stamp request
    8 Time-stamp response
      8.1 DigestedData encapsulation
      8.2 SignedData encapsulation
    9 Time-stamp verification
    Annex A (normative) ASN.1 Module for time-stamping
    Annex B (normative) Additional Discussion
          B.1 Discussion
          B.2 Linking
              B.2.1 Linear chain linking
              B.2.2 Anti-monotone binary linking
              B.2.3 Threaded tree linking
          B.3 Aggregation
              B.3.1 Unity aggregation
              B.3.2 Merkle tree aggregation
              B.3.3 One-way accumulator aggregation
          B.4 Publishing
              B.4.1 No publishing
              B.4.2 Single link publishing
              B.4.3 Merkle tree publishing
    Annex C (informative) Data structures
          C.1 Time-stamps using DigestedData encapsulation
          C.2 Time-stamps using SignedData encapsulation
          C.3 Linear Chain Linking with Merkle Tree Aggregation
    Bibliography

    Abstract - (Show below) - (Hide below)

    Defines a general model for time-stamping services producing linked tokens.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Information Technology Industry Council
    Status Superseded
    Superseded By
    Supersedes

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    ISO/IEC 18014-1:2008 Information technology Security techniques Time-stamping services Part 1: Framework
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective