GB/T 34953.4-2020 PDF English
Price & Delivery
US$325.00 · In stock · Download in 9 secondsGB/T 34953.4-2020: Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
| Standard ID | USD | BUY PDF | Delivery | Standard Title (Description) | Status |
| GB/T 34953.4-2020 | 325 | Add to Cart | Auto, 9 seconds. | Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets | Valid |
Click to Preview this PDF
Similar standards
GB/T 34953.4-2020: Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets
---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT34953.4-2020
GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets (ISO/IEC 20009-4:2017, MOD) ISSUED ON: APRIL 28, 2020 IMPLEMENTED ON: NOVEMBER 01, 2020 Issued by: State Administration for Market Regulation; Standardization Administration of the PRC.
Table of Contents
Foreword ... 3 Introduction ... 5 1 Scope ... 6 2 Normative references ... 6 3 Terms and definitions ... 6 4 Symbols, abbreviated terms and conversion functions ... 11 4.1 Symbols and abbreviated terms ... 11 4.2 Conversion functions ... 14 5 General model for password-based anonymous entity authentication ... 14 5.1 Participants ... 14 5.2 Types of PAEA mechanisms ... 15 5.3 Components of a password-only PAEA ... 15 5.4 Components of a storage-extra PAEA ... 16 5.5 Operation of a PAEA ... 17 6 Password-only PAEA mechanisms ... 18 6.1 General ... 18 6.2 YZ mechanism ... 18 7 Storage-extra PAEA mechanism ... 21 7.1 General ... 21 7.2 YZW mechanism ... 21 Annex A (Normative) Object identifiers ... 30 Bibliography ... 31Foreword
GB/T 34953 "Information technology - Security techniques - Anonymous entity authentication" is divided into 4 parts: - Part 1: General; - Part 2: Mechanisms based on signatures using a group public key; - Part 3: Mechanisms based on blind signatures; - Part 4: Mechanisms based on weak secrets. This Part is Part 4 of GB/T 34953. This Part is drafted in accordance with the rules given in GB/T 1.1-2009. This Part uses the redraft law to modify and adopt ISO/IEC 20009-4:2017 "Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets". Compared with ISO/IEC 20009-4:2017, this Part has structural adjustments. Adjust 6.3 to 6.2. The other clause numbers are revised in turn. The technical differences between this Part and ISO/IEC 20009-4:2017 and the reasons are as follows: - As for the normative references, this Part has made adjustments with technical differences, to adapt to the technical conditions of China. The adjustments are reflected in Clause 2 “Normative references”. The specific adjustments are as follows: Replace ISO/IEC 9797-2 with GB/T 15852.2 which modifies and adopts the international standard; stipulate that the hash algorithm used shall follow relevant national standards and industry standards; Replace ISO/IEC 29000-1 with GB/T 34953.1 which is identical to the international standard; Replace ISO/IEC 19772:2009 with GB/T 36624-2018 which modifies and adopts the international standard; Delete ISO/IEC 10118-3; ISO/IEC 10118-3 specifies the hash algorithm used in mechanisms of this Part. Stipulate that the hash algorithm used shall follow relevant national standards and industry standards; Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets1 Scope
This Part of GB/T 34953 specifies anonymous entity authentication mechanisms based on weak secrets. The precise operation of each mechanism is specified, together with details of all inputs and outputs. This Part is applicable to situations in which the server only verifies that the user belongs to a certain user group without obtaining any information that can be used to identify the user later on.2 Normative references
The following documents are indispensable for the application of this document. For the dated references, only the editions with the dates indicated are applicable to this document. For the undated references, the latest edition (including all the amendments) are applicable to this document. GB/T 15852.2 Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash- function (GB/T 15852.2-2012, ISO/IEC 9797-2:2002, MOD) GB/T 34953.1 Information technology - Security techniques - Anonymous entity authentication - Part 1: General (GB/T 34953.1-2017, ISO 20009- 1:2013, IDT) GB/T 36624-2018 Information technology - Security techniques - Authenticated encryption (ISO/IEC 19772:2009, MOD) ISO/IEC 11770-4:2006 Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets3 Terms and definitions
For the purposes of this document, the terms and definitions given in GB/T 34953.1 and the following apply. ......Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.