Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB/T 38647.2-2020 English PDF

US$1969.00 · In stock
Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB/T 38647.2-2020: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB/T 38647.2-20201969 Add to Cart 10 days Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key Valid

Similar standards

GB/T 38626   GB/T 38671   GB/T 38628   GB/T 38629   GB/T 38647.1   

Basic data

Standard ID: GB/T 38647.2-2020 (GB/T38647.2-2020)
Description (Translated English): Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
Sector / Industry: National Standard (Recommended)
Classification of Chinese Standard: L80
Classification of International Standard: 35.040
Word Count Estimation: 106,194
Date of Issue: 2020-04-28
Date of Implementation: 2020-11-01
Quoted Standard: GB/T 32905; GB/T 32918.2-2016; GB/T 34953.2-2018; GB/T 38647.1; ISO/IEC 15946-1; ISO/IEC 15946-5; ISO/IEC 10118-1; ISO/IEC 10118-2; ISO/IEC 10118-3; ISO/IEC 10118-4
Adopted Standard: ISO/IEC 20008-2-2013, MOD
Issuing agency(ies): State Administration for Market Regulation, China National Standardization Administration
Summary: This standard specifies the general model and requirements for anonymous digital signature mechanisms using group public keys, mechanisms with connection capabilities, mechanisms with open functions, and mechanisms with open and connection functions. This standard specifies: an overview of anonymous digital signature mechanisms using group public key signatures; a variety of mechanisms to provide such anonymous digital signatures. For each mechanism, this standard specifies: the generation process of the group member signature key and the group public key; the process of generating the signature; the process of verifying the signature; the group member opening process (optional); the group signature connection process (Optional); The process of revoking the group's signature. This standard is applicable to guide the design, implementation and application of anonymous digital signature mechanisms using group public keys.

GB/T 38647.2-2020: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key


---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
(Information technology Security technology Anonymous digital signature Part 2.Mechanism using group public key) ICS 35.040 L80 National Standards of People's Republic of China Information Technology Security Technology Anonymous Digital Signature Part 2.Mechanism using group public key (ISO /IEC.20008-2.2013, MOD) 2020-04-28 release 2020-11-01 implementation State Administration of Market Supervision and Administration Issued by the National Standardization Management Committee

Contents

Foreword I Introduction II 1 Scope 1 2 Normative references 1 3 Terms and definitions 1 4 Symbol 2 5 General models and requirements 3 6 Mechanisms with connectivity 4 6.1 Overview 4 6.2 Mechanism 1 4 6.3 Mechanism 2 8 6.4 Mechanism 3 13 6.5 Mechanism 4 16 7 Mechanism with opening function 19 7.1 Overview 19 7.2 Mechanism 5 19 7.3 Mechanism 6 22 8 Mechanism with opening and connection function 24 8.1 Overview 24 8.2 Mechanism 7 24 8.3 Mechanism 8 28 Appendix A (Normative Appendix) Object Identifier 33 Appendix B (Normative Appendix) Password Hash Function 35 Appendix C (Informative Appendix) Security Guidelines for Anonymous Signature Mechanism Using Group Public Key 37 Appendix D (informative appendix) Comparison of revocation mechanisms 40 Appendix E (Informative Appendix) Numerical Examples 43 Appendix F (informative appendix) Proof of the correctness of mechanism 5 95 References 99

Foreword

GB/T 38647 "Anonymous Digital Signature of Information Technology Security Technology" is intended to be divided into two parts. ---Part 1.General Provisions; ---Part 2.The mechanism of using group public key. This part is Part 2 of GB/T 38647. This section was drafted in accordance with the rules given in GB/T 1.1-2009. This section uses the redrafting method to modify the use of ISO /IEC.20008-2.2013 "Information Technology Security Technology Anonymous Digital Signature Part 2.The mechanism of adopting group public key". The technical differences between this part and ISO /IEC.20008-2.2013 and the reasons are as follows. --- With regard to normative quotation documents, this part has been adjusted with technical differences to adapt to my country's technical conditions and adjustments The situation is reflected in Chapter 2 "Regulatory Reference Documents", with specific adjustments as follows. ● Removed ISO /IEC 18031 and ISO /IEC 18032; ● Added GB/T 32905, GB/T 32918.2-2016, GB/T 34953.2-2018 and ISO /IEC 15946-1; ● Replaced ISO /IEC.20008-1 with GB/T 38647.1 modified to adopt international standards. --- Chapter 5 adopts my country's national standard for cryptographic algorithms GB/T 32905 to adapt to my country's technical level. --- Chapter 8 adds a mechanism 8 (see 8.3), which is based on GB/T 32918.2-2016 and is suitable for my country's commercial cryptographic algorithms Anonymous digital signature technology. --- Added content related to the mathematical assumptions and safety parameter selection of mechanism 8 (see Appendix C). --- Added content related to the revocation mechanism of mechanism 8 (see Appendix D). --- Added E.8, gives a numerical example of mechanism 8 (see Appendix E). This part is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260). This section was drafted. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory for Wireless Network Security Technology, Zhongguancun Wireless Network Security Industry Alliance, Commercial Cryptographic Testing Center of National Cryptography Administration, National Radio Monitoring Center Testing Center, National Information Technology Security Research Center, China General Technology Research Institute, China Electronics Technology Standardization Research Institute, Tianjin Electromechanical Products Inspection Testing Center, Chongqing University of Posts and Telecommunications, Beijing Institute of Computer Technology and Application, Ministry of Industry and Information Technology Broadband Wireless IP Standards Working Group. The main drafters of this section. Du Zhiqiang, Cao Jun, Zhang Guoqiang, Li Qin, Li Zhiyong, Li Dong, Zhao Xiaorong, Huang Zhenhai, Li Bing, Tao Hongbo, Liu Kewei, Yan Xiang, Liu Jingli, Zhao Xudong, Wang Yuehui, Zhang Lulu, Lv Chunmei, Xu Yuna, Fu Qiang, Long Zhaohua, Peng Xiao, Xiong Keqi, Lin Dexin, Tie Manxia, Wu Dongyu, Zheng Li, Gao Delong, Zhang Bingling, Yu Guangming, Zhu Zhengmei, Zhao Hui, Huang Kuigang.

Introduction

Anonymous digital signature mechanism is a special type of digital signature mechanism. In this type of digital signature mechanism, unauthorized entities cannot obtain The identity of the signer, but it can be verified that the legal signer has produced a legal signature. The anonymous digital signature mechanism using the group public key has the ability to provide more information to the signer. Some signature mechanisms have connection capabilities Force, where two signatures generated by the same signer are connectable. Some signature mechanisms have the ability to open, where signatures can be Special entities are opened to reveal the identity of the signatory. Some signature mechanisms have both connection and opening capabilities. For each mechanism, this section specifies the opening, connection and/or cancellation procedures. The mechanism specified in this section uses the anti-collision cryptographic hash function specified in GB/T 32905 to calculate the entire message. The issuer of this document draws attention to that when declaring compliance with this document, it may involve CN201810207503.4 related to 8.3, Use of CN201810207564.0, CN201810207571.0 and other patents. The issuer of this document has no position on the authenticity, validity and scope of the above patents. The patent holder has assured the issuer of this document that he is willing to work with any applicant under reasonable and non-discriminatory terms and conditions, Negotiations on patent licensing. The patent holder's statement has been filed with the issuing agency of this document. Relevant information can be contacted through the following Way to get. Patent holder. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd. Address. A201, Qinfengge, Xi'an Software Park, No. 68 Keji 2nd Road, High-tech Zone, Xi'an Contact. Feng Yuchen Postcode. 710075 Email. ipri@iwncomm.com Phone. 029-87607836 Fax. 029-87607829 The issuer of this document draws attention to the revision of this document using ISO /IEC.20008-2.2013.Therefore, in addition to the above statement, South Korea The “Patent Holder’s Proposal for ISO /IEC.20008-2.2013 made by the Institute of Electronic Communications, Intel Corporation and NEC Corporation of Japan The intention to negotiate permission with other parties based on non-discrimination, reasonable conditions and terms" applies to this document. Relevant information can be obtained through the following contact parties The formula gets. Patent holder. Electronics and Telecommunications Research Institute Address. 161, Gajeong-dong, Yuseong-gu, Daejeon, 305-700, KOREA Contact. HanchulShin Email. vip123@etri.ke.kr Phone. 82-042-860-5797 Fax. 82-042-860-3831 Patent holder. Intel Corporation Address. IntelLegalandCorporationAfairs2200MissionColegeBlvd., RNB-150, SantaClara, CA95054 Contact. James Kovacs Email. Standards.Licensing@intel.com Phone. 408-765-1170 Fax. 408-613-7292 Patent holder. NECCorporation Address. 7-1Shiba5-chomeMinato-KuTokyoJapan108-8001Japan Contact. YoshinobuMatsumoto Email. y-matsumoto@cp.jp.nec.com Phone. 81-3-3798-2452 Fax. 81-3-3798-6394 Please note that in addition to the above patents, some content of this document may still involve patents. The issuer of this document is not responsible for identifying these Responsibilities. Information Technology Security Technology Anonymous Digital Signature Part 2.Mechanism using group public key

1 Scope

This part of GB/T 38647 specifies the general model and requirements of anonymous digital signature mechanism using group public key Force mechanism, mechanism with opening function, mechanism with opening and connection function. This section gives. a) An overview of the anonymous digital signature mechanism using group public key signatures; b) Various mechanisms for providing such anonymous digital signatures. For each mechanism, this section specifies. a) Generation process of group member signature key and group public key; b) The process of generating signatures; c) The process of verifying the signature; d) Opening process of group members (optional); e) Group signature connection process (optional); f) The process of revoking the group signature. This section applies to the design, implementation, and application of anonymous digital signature mechanisms that use group public keys.

2 Normative references

The following documents are essential for the application of this document. For dated references, only the dated version applies to this article Pieces. For the cited documents without date, the latest version (including all amendments) applies to this document. GB/T 32905 information security technology SM3 password hash algorithm GB/T 32918.2-2016 Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm Part 2.Digital Signature Algorithm GB/T 34953.2-2018 Information technology security technology Anonymous entity authentication Part 2.Machine based on group public key signature (ISO /IEC.20009-2.2013, IDT) GB/T 38647.1 Information technology security technology Anonymous digital signature Part 1.General (GB/T 38647.1-2020, ISO /IEC.20008-1.2013, MOD) ISO /IEC 10118 (all parts) Information technology-Security hash function (Informationtechnology-Security techniques-Hash-functions) ISO /IEC 15946-1 Information technology security technology Cryptographic technology based on elliptic curves Part 1.General requirements (Infor- mationtechnology-Securitytechniques-Cryptographictechniquesbasedonelipticcurves-Part 1. General) ISO /IEC 15946-5 Information technology security technology Cryptographic technology based on elliptic curves Part 5.Elliptic curve generation (Informationtechnology-Securitytechniques-Cryptographictechniquesbasedonelipticcurves- Part 5.Elipticcurvegeneration)

3 Terms and definitions

The terms and definitions defined in GB/T 38647.1 and the following apply to this document.
......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB/T 38647.2-2020_English be delivered?

Answer: Upon your order, we will start to translate GB/T 38647.2-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB/T 38647.2-2020_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 38647.2-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.