标准号:ISO/IEC 14888-3-2006
实施状态:作废
中文名称:信息技术.安全技术.带附件的数字签名.第3部分:基于离散对数的机制
英文名称:Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
发布日期:2006-11
被替代标准:ISO/IEC 14888-3-2016
代替标准:ISO/IEC 14888-3-1998;ISO/IEC FDIS 14888-3-2006;ISO/IEC 14888-3 Technical Corrigendum 1-2001
采用标准:ANSI/INCITS/ISO/IEC 14888-3-2008,IDT;BS ISO/IEC 14888-3+A1-2006,IDT;CAN/CSA-ISO/IEC 14888-3-07-2007,IDT
起草单位:ISO/IEC JTC 1/SC 27
标准简介:This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides.
- a general description of a digital signature with appendix mechanism;
- a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this part of ISO/IEC 14888 specifies
- the process of generating a pair of keys;
- the process of producing signatures;
- the process of verifying signatures.
The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association between the signer's identification data and the signer's public verfication key can either be guaranteed by an outside entity or mechanism, or the association can be somehow inherent in the verification key itself. In the former case, the scheme is said to be "certificate-based." In the latter case, the scheme is said to be "identity based." Typically, in an identity-based scheme, the verifier can derive the signer's public verification key from the signer's identification data. The digital signature mechanisms specified in this part of ISO/IEC 14888 are classified into cerificate-based and identity-based mechanisms.
文件格式:PDF
文件大小:2.92MB
文件页数:77
(以上信息更新时间为:2019-11-22)
文档语言及版本参照下方封面截图:
点击下方链接查看更多内容。