ISO/IEC 20008-2
ISO/IEC 20008-2:2013
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
ISO/IEC 20008-2:2013 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
It provides
a general description of an anonymous digital signature mechanism using a group public key;
a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, ISO/IEC 20008-2:2013 specifies
the process for generating group member signature keys and a group public key;
the process for producing signatures;
the process for verifying signatures;
the process for opening signatures (if the mechanism supports opening);
the process for linking signatures (if the mechanism supports linking);
the process for revoking group members.
It provides
a general description of an anonymous digital signature mechanism using a group public key;
a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, ISO/IEC 20008-2:2013 specifies
the process for generating group member signature keys and a group public key;
the process for producing signatures;
the process for verifying signatures;
the process for opening signatures (if the mechanism supports opening);
the process for linking signatures (if the mechanism supports linking);
the process for revoking group members.
CHFÂ 221.-
Technical committee
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protectionKeywords
Cyber security - Smart cityPublication type | International Standard |
Publication date | 2013-11-13 |
Edition | 1.0 |
ICS | 35.030 |
Pages | 86 |
File size | 7.01 MB |