INCITS/ISO/IEC 18370-1:2016(2019)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Information technology -- Security techniques -- Blind digital signatures -- Part 1: General
Hardcopy , PDF
English
04-12-2019
29-11-2024
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital signature mechanisms: — blind signature mechanisms with partial disclosure; — blind signature mechanisms with selective disclosure; — traceable blind signature mechanisms.
| Committee |
ISO/IEC JTC 1
|
| DocumentType |
Standard
|
| Pages |
0
|
| PublisherName |
Information Technology Industry Council
|
| Status |
Superseded
|
| SupersededBy |
| Standards | Relationship |
| ISO/IEC 18370-1:2016 | Identical |
| ISO/IEC 11770-2:2008 | Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniques |
| ISO/IEC 10118-4:1998 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic |
| ISO/IEC 20009-4:2017 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
| ISO/IEC 9594-8:2008 | Information technology — Open Systems Interconnection — The Directory: Public-key and attribute certificate frameworks — Part 8: |
| ISO/IEC 9798-6:2010 | Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer |
| ISO/IEC 18370-2:2016 | Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms |
| ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.