|
US$524.00 ยท In stock Delivery: <= 4 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 17902.2-2005: Information technology -- Security techniques -- Digital signatures with appendix -- Part 2: Identity-based mechanisms Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 17902.2-2005 | English | 524 |
Add to Cart
|
4 days [Need to translate]
|
Information technology -- Security techniques -- Digital signatures with appendix -- Part 2: Identity-based mechanisms
| Valid |
GB/T 17902.2-2005
|
PDF similar to GB/T 17902.2-2005
Basic data | Standard ID | GB/T 17902.2-2005 (GB/T17902.2-2005) | | Description (Translated English) | Information technology. Security techniques-Digital signatures with appendix. Part 2: Identity-based mechanisms | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 23,291 | | Date of Issue | 2005-04-19 | | Date of Implementation | 2005-10-01 | | Adopted Standard | ISO/IEC 14888-2-1999, IDT | | Regulation (derived from) | Announcement of Newly Approved National Standards No. 6 of 2005 (No. 80 overall) | | Issuing agency(ies) | General Administration of Quality Supervision, Inspection and Quarantine of the People Republic of China, China National Standardization Administration Committee | | Summary | This standard specifies the message of arbitrary length with appendix mechanism of identity-based signature and digital signature verification process and the overall structure of the basic process. |
GB/T 17902.2-2005: Information technology -- Security techniques -- Digital signatures with appendix -- Part 2: Identity-based mechanisms ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
Information technology.Security techniques-Digital signatures with appendix.Part 2. Identity-based mechanisms
ICS 35.040
L80
National Standards of People's Republic of China
GB/T 17902.2-2005/ISO /IEC 14888-2.1999
Information technology security technology with digital signature of the appendix
Part 2. Identity-based mechanisms
(ISO /IEC 14888-2..1999, IDT)
Released on.2005-04-19
Implemented.2005-10-01
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Administration issued
Content
Foreword III
1 Scope 1
2 Normative references 1
3 Overview 1
4 Terms and Definitions 1
5 symbol 2
6 key generation process 2
6.1 Generating Domain Parameters 2
6.2 Generate Authentication Key and Signature Key 3
7 Signature Process 3
7.1 Generating Pre-Signature 3
7.2 Preparing the message 4
7.3 Calculating evidence 4
7.4 Calculating signature 4
8 Verification process 5
8.1 Preparing the message 6
8.2 Searching for evidence 6
8.3 Calculation Verification Function 7
8.4 Verification evidence 7
9 Guilou-Quisquater Signature Mechanism 7
9.1 Public Key Export Function 8
9.2 Preparing the message 8
9.3 Calculating evidence 8
9.4 Calculating the first part of the signature 8
9.5 Calculating the assignment 8
10 Identity-based signature with short assignment 8
10.1 Preparing Message 8
10.2 Calculating Evidence 8
10.3 Calculating the assignment 8
11 Identity-based signature with message hash code retrieval 8
11.1 Calculating Evidence 9
11.2 Calculating the first part of the signature 9
Appendix A (informative) Numerical example 10
A. 1 Numerical example 10 of the key generation process
A. 1.1 Generating domain parameters 10
A. 1.2 Generate verification key and signature key 11
A. 2 Numerical example of the Guilou-quisquater signature mechanism described in Chapter 9
A. 2.1 Signature Process 11
GB/T 17902.2-2005/ISO /IEC 14888-2.1999
A. 2.2 Verification process 12
A. 3 Numerical example 13 of an identity-based signature with a short assignment described in Chapter 10
A. 3.1 Signature Process 13
A. 3.2 Verification process 14
A. 4 Numerical example 14 of the identity-based signature given by the message hash code search described in Chapter 11
A. 4.1 Signature Process 14
A. 4.2 Verification process 15
Appendix B (informative) Patent Information 17
Reference 18
Figure 1 Signature process with deterministic evidence 4
Figure 2 Signature process with randomized evidence 5
Figure 3 Verification process with deterministic evidence 6
Figure 4 Verification process with randomized evidence 7
GB/T 17902.2-2005/ISO /IEC 14888-2.1999
Foreword
GB/T 17902 "Information Technology Security Technology with Digital Signature of the Appendix" consists of the following parts.
Part 1. Overview;
Part 2. Identity-based mechanisms;
Part 3. Certificate-based mechanisms.
This part is the second part of GB/T 17902, which is equivalent to the international standard ISO /IEC 14888-2..1999 "Information Technology Safety Technology"
Digital signatures with appendix Part 2. Identity-based mechanisms (English version).
Appendix A and Appendix B of this section are informative annexes.
This part is proposed by the Ministry of Information Industry of the People's Republic of China
This part is under the jurisdiction of the National Information Security Standardization Technical Committee;
This part was drafted by China Electronics Technology Standardization Institute and State Key Laboratory of Information Security.
The main drafters of this section. Ye Maofeng, Chen Xing, Luo Fengying, Hu Lei, Ye Dingfeng, Zhang Zhenfeng, Huang Jiaying.
GB/T 17902.2-2005/ISO /IEC 14888-2.1999
Information technology security technology with digital signature of the appendix
Part 2. Identity-based mechanisms
1 Scope
GB/T 17902 specifies various digital signature mechanisms with appendices for messages of any length. It is suitable for providing entity authentication, data
A scheme for initial identification, non-repudiation and data integrity.
This part of GB/T 17902 specifies the signature and verification of an identity-based digital signature mechanism with an appendix for messages of any length.
The overall structure and basic process of the process.
2 Normative references
The terms of the following documents become the provisions of this part by reference in this part of GB/T 17902. Quotations with dated
, all subsequent amendments (not including errata content) or revisions do not apply to this section, however, encouragement is achieved under this section
The parties to the agreement study whether the latest versions of these documents can be used. For undated references, the latest edition applies to this
section.
GB 15851-1995 Information technology security technology Digital signature scheme with message recovery (idt ISO /IEC 9796.1991)
GB/T 17902.1-1999 Information technology security technology with digital signatures in appendix Part 1. Overview
3 Overview
The verification of the digital signature requires the verification key of the signature entity. Therefore, the authenticator must put the correct verification key with the signature entity, or
Specifically, it is associated with the (partial) identification data of the signature entity. If this connection is inherent to the verification key itself, this scheme
It is called "identity-based."
The key generation process for the identity-based scheme defined in this section includes a trusted third party. This trusted third party has a secret
Parameter---Key generation index, which is used to derive the signature key of other entities. The secretness of the signature key unconditionally depends on the key generation
The secret of indexing.
In the verification of identity-based signatures, two parameters are required. The first parameter is the domain validation index, which is common to all entities.
The second parameter is the verification key of the signing entity, which is specific to each entity. Identity-based mechanisms defined in this section
The entity's authentication key is obtained directly from the entity's identification data using a public function.
The identity-based signature mechanism with an appendix is an example of a randomization mechanism, as described in GB/T 17902.1-1999. Digital sign
The name and verification process description follows the general procedure defined in Chapter 10 of GB/T 17902.1-1999. In particular, this standard uses
General requirements conditions, definitions and symbols provided in GB/T 17902.1-1999.
An identity-based digital signature mechanism with an appendix is defined in the detailed description of the following process. They are.
a) the key generation process;
b) the signature process;
c) Verification process.
4 Terms and definitions
The following terms and definitions apply to this part of GB/T 17902.
GB/T 17902.2-2005/ISO /IEC 14888-2.1999
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 17902.2-2005_English be delivered?Answer: Upon your order, we will start to translate GB/T 17902.2-2005_English as soon as possible, and keep you informed of the progress. The lead time is typically 2 ~ 4 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 17902.2-2005_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 17902.2-2005_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|