• INCITS/ISO/IEC 9796-3 : 2000 : R2005

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS

    Available format(s):  Hardcopy, PDF

    Superseded date:  20-02-2019

    Language(s):  English

    Published date:  01-01-2005

    Publisher:  Information Technology Industry Council

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols, conventions, and legend for figures
    5 Requirements
    6 Signature process
    7 Verification process
    8 Signature schemes giving message recovery
    9 Signature scheme on a prime field
    10 Signature scheme on an elliptic curve
    Annex A (normative) - Validation of domain parameters
            and public keys
    Annex B (informative) - Numerical examples I - Signature
            mechanisms on finite fields
    Annex C (informative) - Numerical examples II - Elliptic
            curve mechanisms
    Annex D (informative) - Information about patents
    Bibliography

    Abstract - (Show below) - (Hide below)

    Describes two randomized digital signature schemes giving message recovery. The security of both schemes is based on the difficulty of the discrete logarithm problem.

    General Product Information - (Show below) - (Hide below)

    Committee CS1
    Development Note Supersedes INCITS/ISO/IEC 9796. (02/2003)
    Document Type Standard
    Product Note Reconfirmed 2005
    Publisher Information Technology Industry Council
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective