GB/T 34953.2-2018 PDF English
US$610.00 · In stock · Download in 9 secondsGB/T 34953.2-2018: Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedureStatus: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivery | Name of Chinese Standard | Status |
| GB/T 34953.2-2018 | English | 610 |
Add to Cart
|
0-9 seconds. Auto-delivery
|
Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key
| Valid |
Excerpted PDFs (Download full copy in 9 seconds upon purchase)PDF Preview: GB/T 34953.2-2018
GB/T 34953.2-2018: Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key ---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT34953.2-2018
GB
NATIONAL STANDARD OF THE
PEOPLE’S REPUBLIC OF CHINA
ICS 35.040
L 80
GB/T 34953.2-2018 / ISO/IEC 20009-2.2013
Information technology - Security techniques -
Anonymous entity authentication - Part 2.
Mechanisms based on signatures using a group
public key
(ISO/IEC 20009-2.2013, IDT)
Issued on. SEPTEMBER 17, 2018
Implemented on. APRIL 01, 2019
Issued by. State Administration for Market Regulation;
Standardization Administration of the PRC.
Table of Contents
Foreword... 3
Introduction... 5
1 Scope... 7
2 Normative references... 7
3 Terms and definitions... 8
4 Symbols and abbreviated terms... 10
5 Model and requirements... 12
6 Key generation process... 14
7 Mechanisms without an online TTP... 15
7.1 Introduction... 15
7.2 Unilateral anonymous authentication... 17
7.3 Mutual anonymous authentication... 19
7.4 Unilateral-anonymous mutual authentication... 24
7.5 Mutual anonymous authentication with binding-property... 28
7.6 Unilateral-anonymous mutual authentication with binding-property... 38
8 Mechanisms involving an online TTP... 48
8.1 Introduction... 48
8.2 Unilateral anonymous authentication... 48
8.3 Mutual anonymous authentication... 52
8.4 Unilateral-anonymous mutual authentication... 58
9 The group membership opening process... 71
9.1 General... 71
9.2 The evidence evaluation process... 71
10 The group signature linking process... 72
10.1 General... 72
10.2 Linking process with opener... 72
10.3 Linking process with linking key... 73
10.4 Linking process with linking base... 73
Annex A (Normative) Object identifiers... 75
Annex B (Informative) Information on mechanisms with binding-property... 77
Bibliography... 79
Foreword
GB/T 34953 "Information technology - Security techniques - Anonymous entity
authentication" has been issued or plans to issue the following parts.
- Part 1.General;
- Part 2.Mechanisms based on signatures using a group public key;
- Part 3.Mechanisms based on blind signatures;
- Part 4.Mechanisms based on weak secrets.
This Part is Part 2 of GB/T 34953.
This Part is drafted in accordance with the rules given in GB/T 1.1-2009.
This Part, using translation method, is identical to ISO/IEC 20009-2.2013
"Information technology - Security techniques - Anonymous entity
authentication - Part 2.Mechanisms based on signatures using a group public
key".
China’s document which has a consistent correspondence with the international
document normatively referenced in this Part is as follows.
- GB/T 34953.1-2017 Information technology - Security techniques -
Anonymous entity authentication - Part 1.General (ISO/IEC 20009-1.2013,
IDT).
This Part was proposed by and shall be under the jurisdiction of National
Information Security Standardization Technical Committee (SAC/TC 260).
Drafting organizations of this Part. China IWNCOMM Co., Ltd., National
Engineering Laboratory for Wireless Security, WAPI Industry Alliance (Wireless
Network Security Industry Alliance of Zhongguancun), Commercial
Cryptography Testing Center of the State Cryptography Administration,
Chongqing University of Posts and Telecommunications, The State Radio
Monitoring Center Testing Center, China Electronics Standardization Institute,
Tianjin Radio Monitoring Station, China General Technology Research Institute,
Peking University Shenzhen Graduate School, Institute of Software Chinese
Academy of Sciences, National Computer Network Emergency Response
Technical Team/Coordination Center of China, China Cyberspace Research
Institute, National Research Center for Information Technology Security,
National Information Security Engineering Center, Chinese People's Liberation
Army Information Security Evaluation and Certification Center, The Third
Research Institute of Ministry of Public Security, Beijing Institute of Computer
Technology and Application, Fujian Radio Monitoring Station, Beijing Certificate
Authority Co., Ltd., China Telecom Corp., Ltd. Shanghai Research Institute,
China Broadband Wireless IP Standard Working Group of Ministry of Industry
and Information Technology.
Main drafters of this Part. Du Zhiqiang, Cao Jun, Huang Zhenhai, Li Dawei,
Song Qizhu, Li Qin, Long Zhaohua, Feng Dengguo, Shu Min, Chen Xiaohua,
Li Jingchun, Ge Peiqin, Guo Xiaolei, Gao Bo, Zhu Yuesheng, Li Guangsen, Gu
Jian, Li Nan, Yu Guangming, Zhang Lulu, Tie Manxia, Zhang Bianling, Xu Yuna,
Hu Yanan, Yan Xiang, Zhang Guoqiang, Tong Weigang, Li Ming, Wan Hongtao,
Wang Yuehui, Zheng Li, Peng Xiao, Zhu Zhengmei, Chen Zhiyu, Hou Pengliang,
Xu Fuming.
1 Scope
This Part of GB/T 34953 specifies anonymous entity authentication
mechanisms based on signatures using a group public key in which a verifier
verifies a group signature scheme to authenticate the entity with which it is
communicating, without knowing this entity’s identity.
2 Normative references
The following documents are indispensable for the application of this document.
For the dated references, only the editions with the dates indicated are
applicable to this document. For the undated references, the latest edition
(including all the amendments) are applicable to this document.
ISO/IEC 20008-1 Information technology - Security techniques - Anonymous
digital signatures - Part 1.General
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO/IEC
20008-1, ISO/IEC 20009-1, and the following apply.
Function that outputs one or more shared secrets, for use as keys, given shared
secrets and other mutually known parameters as input.
4 Symbols and abbreviated terms
For the purposes of this Part, the following symbols and abbreviations apply.
5 Model and requirements
Clause 5 specifies the model and requirements for the anonymous
authentication mechanisms.
6 Key generation process
The key generation process includes key generation algorithms that create the
group membership issuing key, the group membership opening key and the
group signature linking key (or keys) if they are required in the mechanism.
7 Mechanisms without an online TTP
If information contained in the text field of the message-to-be-signed of the
token cannot be recovered from the group signature, then it shall be contained
in the unsigned information of the token.
8 Mechanisms involving an online TTP
Unilateral anonymous authentication means that only one of the two entities is
authenticated and that the identity of the authenticated entity is anonymous to
the other entity.
9 The group membership opening process
This process is optional. The evidence evaluation process is run by an evidence
evaluator, which aims to check whether or not a given signature was created
by a specific signer.
10 The group signature linking process
The linking process is run by a linker for a group, who is allowed to connect
multiple group signatures for the group signed by the same signer.
Annex A
(Normative)
Object identifiers
This annex lists the object identifiers assigned to the anonymous authentication
mechanisms specified in this Part.
Annex B
(Informative)
Information on mechanisms with binding-property
This annex explains the necessity of the binding-property in certain usage
scenarios and also contains guidance on parameter selection.
...... Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.
Tips & Frequently Asked QuestionsQuestion 1: How long will the true-PDF of English version of GB/T 34953.2-2018 be delivered?Answer: The full copy PDF of English version of GB/T 34953.2-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice. Question 2: Can I share the purchased PDF of GB/T 34953.2-2018_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 34953.2-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. www.ChineseStandard.us -- GB/T 34953.2-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.
How to buy and download a true PDF of English version of GB/T 34953.2-2018?A step-by-step guide to download PDF of GB/T 34953.2-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD). Step 2: Search keyword "GB/T 34953.2-2018". Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart. Step 4: Select payment option (Via payment agents Stripe or PayPal). Step 5: Customize Tax Invoice -- Fill up your email etc. Step 6: Click "Checkout". Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively. Step 8: Optional -- Go to download PDF. Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice. See screenshots for above steps: Steps 1~3 Steps 4~6 Step 7 Step 8 Step 9
|