• ISO/IEC 18370-2:2016

    Current The latest, up-to-date edition.

    Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms

    Available format(s):  Hardcopy, PDF, PDF 3 Users, PDF 5 Users, PDF 9 Users

    Language(s):  English

    Published date:  01-07-2016

    Publisher:  International Organization for Standardization

    Add To Cart

    Abstract - (Show below) - (Hide below)

    ISO/IEC 18370-2:2016 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures. The variants are blind digital signature mechanisms with partial disclosure, blind digital signature mechanisms with selective disclosure and traceable blind digital signature mechanisms. The security of all the mechanisms in ISO/IEC 18370-2:2016 is based on the discrete logarithm problem.

    For each mechanism, ISO/IEC 18370-2:2016 specifies the following:

    - the process for generating the keys of the entities involved in these mechanisms;

    - the process for producing blind signatures;

    - the process for verifying signatures.

    ISO/IEC 18370-2:2016 specifies another process specific to blind signature mechanisms with selective disclosure, namely, the following:

    - the presentation process.

    Furthermore, ISO/IEC 18370-2:2016 specifies other processes specific to traceable blind signature mechanisms, namely, the following:

    a) the process for tracing requestors;

    b) the process for tracing signatures;

    c) the requestor tracing evidence evaluation process (optional);

    d) the signature tracing evidence evaluation process (optional).

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher International Organization for Standardization
    Status Current

    Standards Referenced By This Book - (Show below) - (Hide below)

    17/30318701 DC : 0 BS ISO/IEC 19286 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PRIVACY-ENHANCING PROTOCOLS AND SERVICES
    CSA ISO/IEC 7816-8 : 2018 IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS - PART 8: COMMANDS AND MECHANISMS FOR SECURITY OPERATIONS
    ISO/IEC 19286:2018 Identification cards — Integrated circuit cards — Privacy-enhancing protocols and services
    BS ISO/IEC 18370-1:2016 Information technology. Security techniques. Blind digital signatures General
    ISO/IEC 18370-1:2016 Information technology Security techniques Blind digital signatures Part 1: General
    BS ISO/IEC 19286:2018 Identification cards. Integrated circuit cards. Privacy-enhancing protocols and services
    ISO/IEC 7816-8:2016 Identification cards Integrated circuit cards Part 8: Commands and mechanisms for security operations

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 8825-1:2015 Information technology ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) Part 1:
    ISO/IEC 15945:2002 Information technology — Security techniques — Specification of TTP services to support the application of digital signatures
    ISO/IEC 18370-1:2016 Information technology Security techniques Blind digital signatures Part 1: General
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 9594-8:2017 Information technology Open Systems Interconnection The Directory Part 8: Public-key and attribute certificate frameworks
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective