HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (26 Oct 2025)

GB/T 34953.2-2018 PDF English

US$610.00 · In stock · Download in 9 seconds
GB/T 34953.2-2018: Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GB/T 34953.2-2018English610 Add to Cart 0-9 seconds. Auto-delivery Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GB/T 34953.2-2018
      

Similar standards

GB/T 34953.4   GB/T 35273   GB/T 34953.1   GB/T 19713   

GB/T 34953.2-2018: Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key


---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT34953.2-2018
GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 GB/T 34953.2-2018 / ISO/IEC 20009-2.2013 Information technology - Security techniques - Anonymous entity authentication - Part 2. Mechanisms based on signatures using a group public key (ISO/IEC 20009-2.2013, IDT) Issued on. SEPTEMBER 17, 2018 Implemented on. APRIL 01, 2019 Issued by. State Administration for Market Regulation; Standardization Administration of the PRC.

Table of Contents

Foreword... 3 Introduction... 5 1 Scope... 7 2 Normative references... 7 3 Terms and definitions... 8 4 Symbols and abbreviated terms... 10 5 Model and requirements... 12 6 Key generation process... 14 7 Mechanisms without an online TTP... 15 7.1 Introduction... 15 7.2 Unilateral anonymous authentication... 17 7.3 Mutual anonymous authentication... 19 7.4 Unilateral-anonymous mutual authentication... 24 7.5 Mutual anonymous authentication with binding-property... 28 7.6 Unilateral-anonymous mutual authentication with binding-property... 38 8 Mechanisms involving an online TTP... 48 8.1 Introduction... 48 8.2 Unilateral anonymous authentication... 48 8.3 Mutual anonymous authentication... 52 8.4 Unilateral-anonymous mutual authentication... 58 9 The group membership opening process... 71 9.1 General... 71 9.2 The evidence evaluation process... 71 10 The group signature linking process... 72 10.1 General... 72 10.2 Linking process with opener... 72 10.3 Linking process with linking key... 73 10.4 Linking process with linking base... 73 Annex A (Normative) Object identifiers... 75 Annex B (Informative) Information on mechanisms with binding-property... 77 Bibliography... 79

Foreword

GB/T 34953 "Information technology - Security techniques - Anonymous entity authentication" has been issued or plans to issue the following parts. - Part 1.General; - Part 2.Mechanisms based on signatures using a group public key; - Part 3.Mechanisms based on blind signatures; - Part 4.Mechanisms based on weak secrets. This Part is Part 2 of GB/T 34953. This Part is drafted in accordance with the rules given in GB/T 1.1-2009. This Part, using translation method, is identical to ISO/IEC 20009-2.2013 "Information technology - Security techniques - Anonymous entity authentication - Part 2.Mechanisms based on signatures using a group public key". China’s document which has a consistent correspondence with the international document normatively referenced in this Part is as follows. - GB/T 34953.1-2017 Information technology - Security techniques - Anonymous entity authentication - Part 1.General (ISO/IEC 20009-1.2013, IDT). This Part was proposed by and shall be under the jurisdiction of National Information Security Standardization Technical Committee (SAC/TC 260). Drafting organizations of this Part. China IWNCOMM Co., Ltd., National Engineering Laboratory for Wireless Security, WAPI Industry Alliance (Wireless Network Security Industry Alliance of Zhongguancun), Commercial Cryptography Testing Center of the State Cryptography Administration, Chongqing University of Posts and Telecommunications, The State Radio Monitoring Center Testing Center, China Electronics Standardization Institute, Tianjin Radio Monitoring Station, China General Technology Research Institute, Peking University Shenzhen Graduate School, Institute of Software Chinese Academy of Sciences, National Computer Network Emergency Response Technical Team/Coordination Center of China, China Cyberspace Research Institute, National Research Center for Information Technology Security, National Information Security Engineering Center, Chinese People's Liberation Army Information Security Evaluation and Certification Center, The Third Research Institute of Ministry of Public Security, Beijing Institute of Computer Technology and Application, Fujian Radio Monitoring Station, Beijing Certificate Authority Co., Ltd., China Telecom Corp., Ltd. Shanghai Research Institute, China Broadband Wireless IP Standard Working Group of Ministry of Industry and Information Technology. Main drafters of this Part. Du Zhiqiang, Cao Jun, Huang Zhenhai, Li Dawei, Song Qizhu, Li Qin, Long Zhaohua, Feng Dengguo, Shu Min, Chen Xiaohua, Li Jingchun, Ge Peiqin, Guo Xiaolei, Gao Bo, Zhu Yuesheng, Li Guangsen, Gu Jian, Li Nan, Yu Guangming, Zhang Lulu, Tie Manxia, Zhang Bianling, Xu Yuna, Hu Yanan, Yan Xiang, Zhang Guoqiang, Tong Weigang, Li Ming, Wan Hongtao, Wang Yuehui, Zheng Li, Peng Xiao, Zhu Zhengmei, Chen Zhiyu, Hou Pengliang, Xu Fuming.

1 Scope

This Part of GB/T 34953 specifies anonymous entity authentication mechanisms based on signatures using a group public key in which a verifier verifies a group signature scheme to authenticate the entity with which it is communicating, without knowing this entity’s identity.

2 Normative references

The following documents are indispensable for the application of this document. For the dated references, only the editions with the dates indicated are applicable to this document. For the undated references, the latest edition (including all the amendments) are applicable to this document. ISO/IEC 20008-1 Information technology - Security techniques - Anonymous digital signatures - Part 1.General

3 Terms and definitions

For the purposes of this document, the terms and definitions given in ISO/IEC 20008-1, ISO/IEC 20009-1, and the following apply. Function that outputs one or more shared secrets, for use as keys, given shared secrets and other mutually known parameters as input.

4 Symbols and abbreviated terms

For the purposes of this Part, the following symbols and abbreviations apply.

5 Model and requirements

Clause 5 specifies the model and requirements for the anonymous authentication mechanisms.

6 Key generation process

The key generation process includes key generation algorithms that create the group membership issuing key, the group membership opening key and the group signature linking key (or keys) if they are required in the mechanism.

7 Mechanisms without an online TTP

If information contained in the text field of the message-to-be-signed of the token cannot be recovered from the group signature, then it shall be contained in the unsigned information of the token.

8 Mechanisms involving an online TTP

Unilateral anonymous authentication means that only one of the two entities is authenticated and that the identity of the authenticated entity is anonymous to the other entity.

9 The group membership opening process

This process is optional. The evidence evaluation process is run by an evidence evaluator, which aims to check whether or not a given signature was created by a specific signer.

10 The group signature linking process

The linking process is run by a linker for a group, who is allowed to connect multiple group signatures for the group signed by the same signer.

Annex A

(Normative) Object identifiers This annex lists the object identifiers assigned to the anonymous authentication mechanisms specified in this Part.

Annex B

(Informative) Information on mechanisms with binding-property This annex explains the necessity of the binding-property in certain usage scenarios and also contains guidance on parameter selection. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GB/T 34953.2-2018 be delivered?

Answer: The full copy PDF of English version of GB/T 34953.2-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GB/T 34953.2-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 34953.2-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GB/T 34953.2-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GB/T 34953.2-2018?

A step-by-step guide to download PDF of GB/T 34953.2-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GB/T 34953.2-2018".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9   

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information