
INCITS/ISO/IEC 18370-1:2016(2019)
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by

Information technology -- Security techniques -- Blind digital signatures -- Part 1: General
Hardcopy , PDF
29-11-2024
English
04-12-2019
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital signature mechanisms: — blind signature mechanisms with partial disclosure; — blind signature mechanisms with selective disclosure; — traceable blind signature mechanisms.
Committee |
ISO/IEC JTC 1
|
DocumentType |
Standard
|
Pages |
0
|
PublisherName |
Information Technology Industry Council
|
Status |
Superseded
|
SupersededBy |
Standards | Relationship |
ISO/IEC 18370-1:2016 | Identical |
ISO/IEC 11770-2:2008 | Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 20009-4:2017 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 9796-3:2006 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9594-8:2008 | Information technology Open Systems Interconnection The Directory: Public-key and attribute certificate frameworks Part 8: |
ISO/IEC 9798-6:2010 | Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
ISO/IEC 18370-2:2016 | Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
ISO/IEC 14888-3:2006 | Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanisms |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.
Logging out.