ISO/IEC 14888-3:2006
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

Standard No.
ISO/IEC 14888-3:2006
Release Date
2006
Published By
International Organization for Standardization (ISO)
Status
Replace By
ISO/IEC 14888-3:2006/Cor 1:2007
Latest
ISO/IEC 14888-3:2018
Scope
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This part of ISO/IEC 14888 provides. - a general description of a digital signature with appendix mechanism; - a variety of mechanisms that provide digital signatures with appendix. For each mechanism, this part of ISO/IEC 14888 specifies - the process of generating a pair of keys; - the process of producing signatures; - the process of verifying signatures. The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association between the signer's identification data and the signer's public verfication key can either be guaranteed by an outside entity or mechanism, or the association can be somehow inherent in the verification key itself. In the former case, the scheme is said to be "certificate-based." In the latter case, the scheme is said to be "identity based." Typically, in an identity-based scheme, the verifier can derive the signer's public verification key from the signer's identification data. The digital signature mechanisms specified in this part of ISO/IEC 14888 are classified into cerificate-based and identity-based mechanisms.

ISO/IEC 14888-3:2006 Referenced Document

  • ISO/IEC 10118 Corrigendum 1 - Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic
  • ISO/IEC 14888-1:1998 Information technology - Security techniques - Digital signatures with appendix - Part 1: General

ISO/IEC 14888-3:2006 history

  • 2018 ISO/IEC 14888-3:2018 IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
  • 2016 ISO/IEC 14888-3:2016 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
  • 2012 ISO/IEC 14888-3:2006/Amd 2:2012 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs
  • 2010 ISO/IEC 14888-3:2006/Amd 1:2010 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Di
  • 2009 ISO/IEC 14888-3:2006/Cor 2:2009 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms; Technical Corrigendum 2
  • 2007 ISO/IEC 14888-3:2006/Cor 1:2007 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms; Technical Corrigendum 1
  • 2006 ISO/IEC 14888-3:2006 Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
  • 2001 ISO/IEC 14888-3:1998/Cor 1:2001 Information technology - Security techniques; Digital signatures with appendix - Part 3: Certificate-based mechanisms; Technical Corrigendum 1
  • 1998 ISO/IEC 14888-3:1998 Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms



Copyright ©2024 All Rights Reserved