ISO/IEC 14888-3:2018
Current
The latest, up-to-date edition.
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
Hardcopy , PDF
English
12-11-2018
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
— a general description of a digital signature with appendix mechanism, and
— a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this document specifies
— the process of generating a pair of keys,
— the process of producing signatures, and
— the process of verifying signatures.
Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.
Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.
Annex D defines how to generate DSA domain parameters.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
155
|
| PublisherName |
International Organization for Standardization
|
| Status |
Current
|
| Supersedes |
| Standards | Relationship |
| DS/ISO/IEC 14888-3:2018 | Identical |
| NEN-ISO/IEC 14888-3:2018 en | Identical |
| BS ISO/IEC 14888-3:2016 | Identical |
| IS/ISO/IEC 14888 : Part 3 : 2018 | Identical |
| INCITS/ISO/IEC 14888-3:2018(2023) | Identical |
| BS ISO/IEC 14888-3:2018 | Identical |
| INCITS/ISO/IEC 20008-1:2013(R2019) | Information technology - Security techniques - Anonymous digital signatures - Part 1: General<br> |
| INCITS/ISO/IEC 11889-4:2015(2019) | Information technology — Trusted Platform Module Library — Part 4: Supporting Routines |
| INCITS/ISO/IEC 24727-3:2008(R2019) | Identification cards — Integrated circuit card programming interfaces — Part 3: Application interface |
| INCITS/ISO/IEC 24727-4:2008(R2019) | Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration |
| INCITS/ISO/IEC 11889-2:2015(2019) | Information technology -- Trusted Platform Module Library -- Part 2: Structures |
| INCITS/ISO/IEC 11889-1:2015(2019) | Information technology -- Trusted platform module library -- Part 1: Architecture |
| INCITS/ISO/IEC 18370-2:2016(R2019) | Information technology -- Security techniques - - Blind digital signatures -- Part 2: Discrete logarithm based mechanisms |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.