|
US$1969.00 · In stock Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email. GB/T 38647.2-2020: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key Status: Valid
| Standard ID | Contents [version] | USD | STEP2 | [PDF] delivered in | Standard Title (Description) | Status | PDF |
| GB/T 38647.2-2020 | English | 1969 |
Add to Cart
|
10 days [Need to translate]
|
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
| Valid |
GB/T 38647.2-2020
|
PDF similar to GB/T 38647.2-2020
Basic data | Standard ID | GB/T 38647.2-2020 (GB/T38647.2-2020) | | Description (Translated English) | Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key | | Sector / Industry | National Standard (Recommended) | | Classification of Chinese Standard | L80 | | Classification of International Standard | 35.040 | | Word Count Estimation | 106,194 | | Date of Issue | 2020-04-28 | | Date of Implementation | 2020-11-01 | | Quoted Standard | GB/T 32905; GB/T 32918.2-2016; GB/T 34953.2-2018; GB/T 38647.1; ISO/IEC 15946-1; ISO/IEC 15946-5; ISO/IEC 10118-1; ISO/IEC 10118-2; ISO/IEC 10118-3; ISO/IEC 10118-4 | | Adopted Standard | ISO/IEC 20008-2-2013, MOD | | Issuing agency(ies) | State Administration for Market Regulation, China National Standardization Administration | | Summary | This standard specifies the general model and requirements for anonymous digital signature mechanisms using group public keys, mechanisms with connection capabilities, mechanisms with open functions, and mechanisms with open and connection functions. This standard specifies: an overview of anonymous digital signature mechanisms using group public key signatures; a variety of mechanisms to provide such anonymous digital signatures. For each mechanism, this standard specifies: the generation process of the group member signature key and the group public key; the process of generating the signature; the process of verifying the signature; the group member opening process (optional); the group signature connection process (Optional); The process of revoking the group's signature. This standard is applicable to guide the design, implementation and application of anonymous digital signature mechanisms using group public keys. |
GB/T 38647.2-2020: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key ---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
(Information technology Security technology Anonymous digital signature Part 2.Mechanism using group public key)
ICS 35.040
L80
National Standards of People's Republic of China
Information Technology Security Technology Anonymous Digital Signature
Part 2.Mechanism using group public key
(ISO /IEC.20008-2.2013, MOD)
2020-04-28 release
2020-11-01 implementation
State Administration of Market Supervision and Administration
Issued by the National Standardization Management Committee
Contents
Foreword I
Introduction II
1 Scope 1
2 Normative references 1
3 Terms and definitions 1
4 Symbol 2
5 General models and requirements 3
6 Mechanisms with connectivity 4
6.1 Overview 4
6.2 Mechanism 1 4
6.3 Mechanism 2 8
6.4 Mechanism 3 13
6.5 Mechanism 4 16
7 Mechanism with opening function 19
7.1 Overview 19
7.2 Mechanism 5 19
7.3 Mechanism 6 22
8 Mechanism with opening and connection function 24
8.1 Overview 24
8.2 Mechanism 7 24
8.3 Mechanism 8 28
Appendix A (Normative Appendix) Object Identifier 33
Appendix B (Normative Appendix) Password Hash Function 35
Appendix C (Informative Appendix) Security Guidelines for Anonymous Signature Mechanism Using Group Public Key 37
Appendix D (informative appendix) Comparison of revocation mechanisms 40
Appendix E (Informative Appendix) Numerical Examples 43
Appendix F (informative appendix) Proof of the correctness of mechanism 5 95
References 99
Foreword
GB/T 38647 "Anonymous Digital Signature of Information Technology Security Technology" is intended to be divided into two parts.
---Part 1.General Provisions;
---Part 2.The mechanism of using group public key.
This part is Part 2 of GB/T 38647.
This section was drafted in accordance with the rules given in GB/T 1.1-2009.
This section uses the redrafting method to modify the use of ISO /IEC.20008-2.2013 "Information Technology Security Technology Anonymous Digital Signature
Part 2.The mechanism of adopting group public key".
The technical differences between this part and ISO /IEC.20008-2.2013 and the reasons are as follows.
--- With regard to normative quotation documents, this part has been adjusted with technical differences to adapt to my country's technical conditions and adjustments
The situation is reflected in Chapter 2 "Regulatory Reference Documents", with specific adjustments as follows.
● Removed ISO /IEC 18031 and ISO /IEC 18032;
● Added GB/T 32905, GB/T 32918.2-2016, GB/T 34953.2-2018 and ISO /IEC 15946-1;
● Replaced ISO /IEC.20008-1 with GB/T 38647.1 modified to adopt international standards.
--- Chapter 5 adopts my country's national standard for cryptographic algorithms GB/T 32905 to adapt to my country's technical level.
--- Chapter 8 adds a mechanism 8 (see 8.3), which is based on GB/T 32918.2-2016 and is suitable for my country's commercial cryptographic algorithms
Anonymous digital signature technology.
--- Added content related to the mathematical assumptions and safety parameter selection of mechanism 8 (see Appendix C).
--- Added content related to the revocation mechanism of mechanism 8 (see Appendix D).
--- Added E.8, gives a numerical example of mechanism 8 (see Appendix E).
This part is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This section was drafted. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd., National Engineering Laboratory for Wireless Network Security Technology,
Zhongguancun Wireless Network Security Industry Alliance, Commercial Cryptographic Testing Center of National Cryptography Administration, National Radio Monitoring Center Testing Center, National
Information Technology Security Research Center, China General Technology Research Institute, China Electronics Technology Standardization Research Institute, Tianjin Electromechanical Products Inspection
Testing Center, Chongqing University of Posts and Telecommunications, Beijing Institute of Computer Technology and Application, Ministry of Industry and Information Technology Broadband Wireless IP Standards Working Group.
The main drafters of this section. Du Zhiqiang, Cao Jun, Zhang Guoqiang, Li Qin, Li Zhiyong, Li Dong, Zhao Xiaorong, Huang Zhenhai, Li Bing, Tao Hongbo, Liu Kewei,
Yan Xiang, Liu Jingli, Zhao Xudong, Wang Yuehui, Zhang Lulu, Lv Chunmei, Xu Yuna, Fu Qiang, Long Zhaohua, Peng Xiao, Xiong Keqi, Lin Dexin, Tie Manxia,
Wu Dongyu, Zheng Li, Gao Delong, Zhang Bingling, Yu Guangming, Zhu Zhengmei, Zhao Hui, Huang Kuigang.
Introduction
Anonymous digital signature mechanism is a special type of digital signature mechanism. In this type of digital signature mechanism, unauthorized entities cannot obtain
The identity of the signer, but it can be verified that the legal signer has produced a legal signature.
The anonymous digital signature mechanism using the group public key has the ability to provide more information to the signer. Some signature mechanisms have connection capabilities
Force, where two signatures generated by the same signer are connectable. Some signature mechanisms have the ability to open, where signatures can be
Special entities are opened to reveal the identity of the signatory. Some signature mechanisms have both connection and opening capabilities.
For each mechanism, this section specifies the opening, connection and/or cancellation procedures.
The mechanism specified in this section uses the anti-collision cryptographic hash function specified in GB/T 32905 to calculate the entire message.
The issuer of this document draws attention to that when declaring compliance with this document, it may involve CN201810207503.4 related to 8.3,
Use of CN201810207564.0, CN201810207571.0 and other patents.
The issuer of this document has no position on the authenticity, validity and scope of the above patents.
The patent holder has assured the issuer of this document that he is willing to work with any applicant under reasonable and non-discriminatory terms and conditions,
Negotiations on patent licensing. The patent holder's statement has been filed with the issuing agency of this document. Relevant information can be contacted through the following
Way to get.
Patent holder. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd.
Address. A201, Qinfengge, Xi'an Software Park, No. 68 Keji 2nd Road, High-tech Zone, Xi'an
Contact. Feng Yuchen
Postcode. 710075
Email. [email protected]
Phone. 029-87607836
Fax. 029-87607829
The issuer of this document draws attention to the revision of this document using ISO /IEC.20008-2.2013.Therefore, in addition to the above statement, South Korea
The “Patent Holder’s Proposal for ISO /IEC.20008-2.2013 made by the Institute of Electronic Communications, Intel Corporation and NEC Corporation of Japan
The intention to negotiate permission with other parties based on non-discrimination, reasonable conditions and terms" applies to this document. Relevant information can be obtained through the following contact parties
The formula gets.
Patent holder. Electronics and Telecommunications Research Institute
Address. 161, Gajeong-dong, Yuseong-gu, Daejeon, 305-700, KOREA
Contact. HanchulShin
Email. [email protected]
Phone. 82-042-860-5797
Fax. 82-042-860-3831
Patent holder. Intel Corporation
Address. IntelLegalandCorporationAfairs2200MissionColegeBlvd., RNB-150, SantaClara, CA95054
Contact. James Kovacs
Email. [email protected]
Phone. 408-765-1170
Fax. 408-613-7292
Patent holder. NECCorporation
Address. 7-1Shiba5-chomeMinato-KuTokyoJapan108-8001Japan
Contact. YoshinobuMatsumoto
Email. [email protected]
Phone. 81-3-3798-2452
Fax. 81-3-3798-6394
Please note that in addition to the above patents, some content of this document may still involve patents. The issuer of this document is not responsible for identifying these
Responsibilities.
Information Technology Security Technology Anonymous Digital Signature
Part 2.Mechanism using group public key
1 Scope
This part of GB/T 38647 specifies the general model and requirements of anonymous digital signature mechanism using group public key
Force mechanism, mechanism with opening function, mechanism with opening and connection function.
This section gives.
a) An overview of the anonymous digital signature mechanism using group public key signatures;
b) Various mechanisms for providing such anonymous digital signatures.
For each mechanism, this section specifies.
a) Generation process of group member signature key and group public key;
b) The process of generating signatures;
c) The process of verifying the signature;
d) Opening process of group members (optional);
e) Group signature connection process (optional);
f) The process of revoking the group signature.
This section applies to the design, implementation, and application of anonymous digital signature mechanisms that use group public keys.
2 Normative references
The following documents are essential for the application of this document. For dated references, only the dated version applies to this article
Pieces. For the cited documents without date, the latest version (including all amendments) applies to this document.
GB/T 32905 information security technology SM3 password hash algorithm
GB/T 32918.2-2016 Information Security Technology SM2 Elliptic Curve Public Key Cryptography Algorithm Part 2.Digital Signature Algorithm
GB/T 34953.2-2018 Information technology security technology Anonymous entity authentication Part 2.Machine based on group public key signature
(ISO /IEC.20009-2.2013, IDT)
GB/T 38647.1 Information technology security technology Anonymous digital signature Part 1.General (GB/T 38647.1-2020,
ISO /IEC.20008-1.2013, MOD)
ISO /IEC 10118 (all parts) Information technology-Security hash function (Informationtechnology-Security
techniques-Hash-functions)
ISO /IEC 15946-1 Information technology security technology Cryptographic technology based on elliptic curves Part 1.General requirements (Infor-
mationtechnology-Securitytechniques-Cryptographictechniquesbasedonelipticcurves-Part 1.
General)
ISO /IEC 15946-5 Information technology security technology Cryptographic technology based on elliptic curves Part 5.Elliptic curve generation
(Informationtechnology-Securitytechniques-Cryptographictechniquesbasedonelipticcurves-
Part 5.Elipticcurvegeneration)
3 Terms and definitions
The terms and definitions defined in GB/T 38647.1 and the following apply to this document.
Tips & Frequently Asked Questions:Question 1: How long will the true-PDF of GB/T 38647.2-2020_English be delivered?Answer: Upon your order, we will start to translate GB/T 38647.2-2020_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time. Question 2: Can I share the purchased PDF of GB/T 38647.2-2020_English with my colleagues?Answer: Yes. The purchased PDF of GB/T 38647.2-2020_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet. Question 3: Does the price include tax/VAT?Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countriesQuestion 4: Do you accept my currency other than USD?Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.
|