TR 102 272 : 1.1.1
Current
The latest, up-to-date edition.
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES
Hardcopy , PDF
English
Intellectual Property Rights
Foreword
Introduction
1 Scope
2 References
3 Definitions and abbreviations
3.1 Definitions
3.2 Abbreviations
4 Signature Policy overview
5 Signature policy specification in informal free text form
6 Signature policy specification in ASN.1
6.1 Overall ASN.1 structure
6.2 Signature validation policy
6.3 Common Rules
6.4 Commitment Rules
6.5 Signer and Verifier Rules
6.6 Certificate and revocation requirement
6.7 Signing certificate trust conditions
6.8 Time-Stamp trust conditions
6.9 Attribute trust conditions
6.10 Algorithm constraints
6.11 Signature policy extensions
Annex A: ASN.1 modules
A.1 Signature policies definitions using X.208 (1988)
ASN.1 syntax
A.2 Signature policy definitions using X.680 (2002)
ASN.1 syntax
Annex B: What is a signature policy and signature validation policy
B.0 Introduction
B.1 Identification of signature policy
B.2 General signature policy information
B.3 Recognized commitment types
B.4 Rules for use of certification authorities
B.5 Rules for the use of time-stamping and time-marking
B.6 Revocation rules
B.7 Rules for the use of roles
B.8 Rules for verification data to be followed
B.9 Rules for algorithm constraints and key lengths
B.10 Other signature policy rules
B.11 Signature policy protection
Annex C: Bibliography
History
Describes the aspects of Electronic Signature Policies that were defined in TS 101 733 v1 and other older versions of that document.
Committee |
ESI
|
DocumentType |
Standard
|
Pages |
39
|
PublisherName |
European Telecommunications Standards Institute
|
Status |
Current
|
TS 102 853 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE VALIDATION PROCEDURES AND POLICIES |
13/30274710 DC : 0 | BS EN 419111-4 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 4: CORE PP |
SR 003 186 : 2.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI) TESTING INTEROPERABILITY AND CONFORMITY ACTIVITIES TO BE RUN DURING THE IMPLEMENTATION AND PROMOTION OF THE FRAMEWORK OF DIGITAL SIGNATURES |
13/30274704 DC : 0 | BS EN 419111-2 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 2: CORE PP |
13/30274701 DC : 0 | BS EN 419111-1 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - PART 1: INTRODUCTION |
TS 102 778-5 : 1.1.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); PDF ADVANCED ELECTRONIC SIGNATURE PROFILES; PART 5: PADES FOR XML CONTENT - PROFILES FOR XADES SIGNATURES |
13/30274713 DC : 0 | BS EN 419111-5 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE VERIFICATION APPLICATION - PART 5: POSSIBLE EXTENSIONS |
13/30274707 DC : 0 | BS EN 419111-3 - PROTECTION PROFILES FOR SIGNATURE CREATION AND VERIFICATION APPLICATION - SIGNATURE CREATION APPLICATION - PART 3: POSSIBLE EXTENSIONS |
TS 101 861 : 1.4.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); TIME STAMPING PROFILE |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
ISO/IEC 10118-4:1998 | Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
TR 102 038 : 1.1.1 | TC SECURITY - ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML FORMAT FOR SIGNATURE POLICIES |
ISO 7498-2:1989 | Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
IEEE DRAFT 1363 : D13 99 | DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY |
ISO/IEC 14888-1:2008 | Information technology — Security techniques — Digital signatures with appendix — Part 1: General |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
TS 102 023 : 1.2.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR TIME-STAMPING AUTHORITIES |
ISO/IEC 13888-1:2009 | Information technology Security techniques Non-repudiation Part 1: General |
TS 101 733 : 2.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CMS ADVANCED ELECTRONIC SIGNATURES (CADES) |
TS 101 456 : 1.4.3 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); POLICY REQUIREMENTS FOR CERTIFICATION AUTHORITIES ISSUING QUALIFIED CERTIFICATES |
ISO/IEC 9796-2:2010 | Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 15946-2:2002 | Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
TS 101 903 : 1.4.2 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); XML ADVANCED ELECTRONIC SIGNATURES (XADES) |
ISO/IEC 10118-2:2010 | Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 9796:1991 | Information technology Security techniques Digital signature scheme giving message recovery |
ISO/IEC 14888-2:2008 | Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
TR 102 045 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICY FOR EXTENDED BUSINESS MODEL |
TS 101 862 : 1.3.3 | QUALIFIED CERTIFICATE PROFILE |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.