GB/T 38647.1-2020 English PDFUS$489.00 · In stock
Delivery: <= 5 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 38647.1-2020: Information technology - Security techniques - Anonymous digital signatures - Part 1: General Status: Valid
Basic dataStandard ID: GB/T 38647.1-2020 (GB/T38647.1-2020)Description (Translated English): Information technology - Security techniques - Anonymous digital signatures - Part 1: General Sector / Industry: National Standard (Recommended) Classification of Chinese Standard: L80 Classification of International Standard: 35.040 Word Count Estimation: 26,237 Date of Issue: 2020-04-28 Date of Implementation: 2020-11-01 Quoted Standard: GB/T 15843.1; GB/T 15843.2; GB/T 15843.3; GB/T 15843.4; GB/T 15843.5; GB/T 15843.6; GB/T 34953.2; GB/T 38647.2 Adopted Standard: ISO/IEC 20008-1-2013, MOD Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration Summary: This standard specifies the definition, selection and general requirements of anonymous signature mechanisms, as well as the general model, entity set and partial process of the following two anonymous signature mechanisms: a) a signature mechanism using group public keys; b) a signature mechanism using multiple public keys Signature mechanism. This standard is applicable to guide the design, implementation and application of anonymous digital signature mechanisms. GB/T 38647.1-2020: Information technology - Security techniques - Anonymous digital signatures - Part 1: General---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order. Information technology--Security techniques--Anonymous digital signatures--Part 1. General ICS 35.040 L80 National Standards of People's Republic of China Information Technology Security Technology Anonymous Digital Signature Part 1. General Part 1. General (ISO /IEC .20008-1..2013, MOD) 2020-04-28 release 2020-11-01 implementation State Administration of Market Supervision and Administration Issued by the National Standardization Management Committee ContentsForeword Ⅲ Introduction IV 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Symbol 7 5 Selection of group public key and multiple public keys 7 6 General requirements 10 7 Adopt group public key mechanism 11 7.1 General model 11 7.2 Entity 11 7.3 Key generation process 12 7.4 Group signature process 13 7.5 Group signature verification process 13 7.6 Group member opening process 13 7.7 Group signature connection process 14 7.8 Group signature revocation process 14 8 The mechanism of using multiple public keys 17 8.1 General model 17 8.2 Entity 17 8.3 Key generation process 17 8.4 Ring signature process 17 8.5 Ring signature verification process 17 References 18ForewordGB/T 38647 "Anonymous Digital Signature of Information Technology Security Technology" is intended to be divided into two parts. --- Part 1. General Provisions; --- Part 2. The mechanism of using group public key. This part is Part 1 of GB/T 38647. This section was drafted in accordance with the rules given in GB/T 1.1-2009. This section uses the redrafting method to modify the use of ISO /IEC .20008-1..2013 "Information Technology Security Technology Anonymous Digital Signature Part 1. General Provisions. Compared with ISO /IEC .20008-1..2013, this part is structurally adjusted, Chapter 2 is added, and the other article numbers are revised sequentially. There are technical differences between this part and ISO /IEC .20008-1..2013, and the terms involved in these differences have been adopted on the outside margin The vertical single line (|) in the blank position is marked. The specific technical differences and the reasons are as follows. --- Added Chapter 2 normative references (see Chapter 2); --- Removed the abbreviations "DAA" and "TPM", which is compatible with China's technical level (see ISO /IEC .20008-1..2013, section 3) chapter); --- End of paragraph 4 of Chapter 6 adds different types of entity authentication mechanisms supported by different types of digital signature technologies, and gives A national standard regulating the identification mechanism of these entities has been issued (see Chapter 6). Please note that some content of this document may involve patents. The issuer of this document does not assume responsibility for identifying these patents. This part is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This section was drafted. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory for Wireless Network Security Technology, Zhongguancun Wireless Network Security Industry Alliance, Commercial Cryptographic Testing Center of National Cryptography Administration, National Radio Monitoring Center Testing Center, National Information Technology Security Research Center, China General Technology Research Institute, China Electronics Technology Standardization Research Institute, Tianjin Electromechanical Products Inspection Testing Center, Chongqing University of Posts and Telecommunications, Beijing Institute of Computer Technology and Applications, Tianjin Radio Monitoring Station, Ministry of Industry and Information Technology Broadband Wireless IP Standards Working Group. The main drafters of this section. Du Zhiqiang, Li Qin, Huang Zhenhai, Yan Xiang, Cao Jun, Liu Kewei, Zhao Xiaorong, Zhang Guoqiang, Li Zhiyong, Li Dong, Tao Hongbo, Liu Jingli, Zhao Xudong, Li Bing, Xu Yuna, Fu Qiang, Long Zhaohua, Peng Xiao, Xiong Keqi, Tie Manxia, Fang Hua, Lin Dexin, Huang Kuigang, Yu Guangming, Wu Dongyu, Gao Delong, Zhang Bingling, Zhu Zhengmei, Wang Yuehui, Zhao Hui.IntroductionThe mechanism specified in GB/T 38647 uses cryptographic algorithms specified in various standards, such as. a) You can use the anti-collision cryptographic hash function to perform cryptographic hash operations on signed messages and calculate signatures; b) When a certificate is needed to verify the public key, a traditional digital signature mechanism can be used; c) If an entity requires data communications to be authenticated as part of its mechanism when implementing the mechanism, it may be necessary to use traditional Body identification mechanism; d) If the information of some entities needs to be encrypted in the anonymous digital signature mechanism, it may be necessary to use traditional asymmetric encryption Mechanisms to protect privacy and confidentiality. Anonymous digital signature mechanisms can be used to provide services such as entity authentication, data source authentication, non-repudiation, and data integrity. digital signature The mechanism can enable the owner (or holder) of the private key to generate digitally signed messages individually or jointly. Its corresponding verification key (or multiple keys) Can be used to verify the signature validity of the message. The digital signature mechanism satisfies. a) The attacker needs to have one or both of the following. 1) Verification key instead of signing key; 2) The signature set of a series of messages adaptively selected by the attacker. b) The attacker is computationally infeasible under the following circumstances. 1) Generate a valid signature for the new message; 2) Recover the signature key; 3) In some cases, different valid signatures are generated on previously signed messages. Anonymous digital signature is a special type of digital signature mechanism. In the anonymous digital signature mechanism, given a digital signature, one includes Unauthorized entities, including the verifier, cannot recover the signer ’s identity or identity. However, such a mechanism still has only legally signed The famous party can generate a valid signature. There are four different situations for authorized entities participating in the anonymous signature mechanism. a) The mechanism by which authorized entities can verify the signature of the signing party; b) An authorized entity can only have the ability to connect two signatures created by the same signer but cannot verify the identity of the signer mechanism; c) A mechanism that contains two authorized entities and conforms to the first two situations; d) A mechanism that contains two authorized entities that does not meet the first two conditions. An example application of anonymous digital signature is to realize anonymous entity authentication. GB/T 34953.2 specifies an anonymous entity authentication mechanism. Unlike the traditional digital signature mechanism, the anonymous digital signature mechanism is based on asymmetric cryptography and involves three basic operations. a) The process of generating signature key and verification key; b) The process of creating an anonymous digital signature using a signature key; c) The process of verifying the anonymous digital signature using the verification key. One of the main differences between traditional digital signatures and anonymous digital signatures is the method of using public keys for signature verification. To verify A traditional digital signature, the verifier uses the verification key bound to the identity of the signer to verify the anonymous digital signature. A group of public keys or multiple public keys, they are not bound to a single signer. Anonymous signatures using group public keys are often referred to as group signatures. Anonymous signatures with multiple public keys are often called ring signatures. The strength of anonymity (that is, the degree of anonymity) provided by the anonymous signature mechanism depends on The size of the group and the number of public keys. In an anonymous digital signature mechanism using group public keys, three different authorization levels can be performed on an entity or a group of entities The revocation includes the following three possibilities. a) The entire group is withdrawn, that is, the entire group is withdrawn. b) Revoke the membership of a group member. As a result, the revoked member can no longer authorize the representative group to create a group signature; c) The signature verifier can revoke the permission of a certain anonymous signature type created by the group members. After such revocation, it has been applied for The revoked member can still create other anonymous signatures on behalf of the group. Information Technology Security Technology Anonymous Digital Signature Part 1. General1 ScopeThis part of GB/T 38647 specifies the definition, selection and overall requirements of the anonymous signature mechanism, as well as the following two anonymous signature mechanisms The common model, entity set and part of the process. a) Use the signature mechanism of the group public key; b) Use multiple public key signature mechanism. This part is applicable to guide the design, implementation and application of anonymous digital signature mechanism.2 Normative referencesThe following documents are essential for the application of this document. For dated references, only the dated version applies to this article Pieces. For the cited documents without date, the latest version (including all amendments) applies to this document. GB/T 15843 (all parts) Information technology security technology entity identification GB/T 34953.2 Information technology security technology Anonymous entity authentication Part 2. Mechanism based on group public key signature GB/T 38647.2 Information technology security technology Anonymous digital signature Part 2. Mechanism using group public key3 Terms and definitionsThe following terms and definitions apply to this document. 3.1 Anonymous digital signature A group public key or multiple public keys can be used to verify the signature, and unauthorized entities cannot pass the signature (including the signed The verifier) traces the distinguishable identifier of the signer. Note. Anonymous digital signature can also be called anonymous signature or simply digital signature or signature. 3.2 Anonymitystrength A number derived from the probability that an unauthorized entity can determine the true signer's probability from a given signature. Note. Anonymity strength n means that an unauthorized entity can correctly guess the true signer from a signature with a probability of 1/n. 3.3 Collision-resistant hash-function A cryptographic hash function that satisfies the following characteristics. finding any two different inputs that can be mapped to the same output is computationally feasible. Note. The feasibility of the calculation depends on the specific security needs and environment. 3.4 Data element Integer, bit string, set of integers, or set of bit strings. ......Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 38647.1-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 38647.1-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 3 ~ 5 working days. The lengthier the document the longer the lead time.Question 2: Can I share the purchased PDF of GB/T 38647.1-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 38647.1-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay. |