BS ISO IEC 20009-1-2013 Information technology Security techniques Anonymous entity authentication General《信息技术 安全技术 匿名实体鉴别 总则》.pdf
《BS ISO IEC 20009-1-2013 Information technology Security techniques Anonymous entity authentication General《信息技术 安全技术 匿名实体鉴别 总则》.pdf》由会员分享,可在线阅读,更多相关《BS ISO IEC 20009-1-2013 Information technology Security techniques Anonymous entity authentication General《信息技术 安全技术 匿名实体鉴别 总则》.pdf(18页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards Publication BS ISO/IEC 20009-1:2013 Information technology Security techniques Anonymous entity authentication Part 1: GeneralBS ISO/IEC 20009-1:2013 BRITISH STANDARD National foreword This British Standard is the UK implementation of ISO/IEC 20009-1:2013. The UK participation in its p
2、reparation was entrusted to Technical Committee IST/33, IT - Security techniques. A list of organizations represented on this committee can be obtained on request to its secretary. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its
3、correct application. The British Standards Institution 2013. Published by BSI Standards Limited 2013 ISBN 978 0 580 73400 7 ICS 35.040 Compliance with a British Standard cannot confer immunity from legal obligations. This British Standard was published under the authority of the Standards Policy and
4、 Strategy Committee on 31 August 2013. Amendments issued since publication Date Text affectedBS ISO/IEC 20009-1:2013 Information technology Security techniques Anonymous entity authentication Part 1: General Technologies de linformation Techniques de scurit Authentification dentit anonyme Partie 1:
5、Gnralits ISO/IEC 2013 INTERNATIONAL STANDARD ISO/IEC 20009-1 First edition 2013-08-01 Reference number ISO/IEC 20009-1:2013(E)BS ISO/IEC 20009-1:2013ISO/IEC 20009-1:2013(E)ii ISO/IEC 2013 All rights reserved COPYRIGHT PROTECTED DOCUMENT ISO/IEC 2013 All rights reserved. Unless otherwise specified, n
6、o part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISOs memb
7、er body in the country of the requester. ISO copyright office Case postale 56 CH-1211 Geneva 20 Tel. + 41 22 749 01 11 Fax + 41 22 749 09 47 E-mail copyrightiso.org Web www.iso.org Published in SwitzerlandBS ISO/IEC 20009-1:2013ISO/IEC 20009-1:2013(E) ISO/IEC 2013 All rights reserved iii Contents Pa
8、ge Foreword iv Introduction v 1 Scope . 1 2 T erms and definitions . 1 3 Symbols and abbreviated terms . 3 3.1 Symbols . 3 3.2 Abbreviations . 3 4 Anonymous entity authentication model . 4 5 General requirements and constraints . 4 6 Managing anonymity 5 Bibliography 6BS ISO/IEC 20009-1:2013ISO/IEC
9、20009-1:2013(E) Foreword ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of ISO or IEC participate in the development of International Standard
10、s through technical committees established by the respective organization to deal with particular fields of technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with ISO and IEC
11、, also take part in the work. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1. International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2. The main task of the joint technical committee is t
12、o prepare International Standards. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national bodies casting a vote. Attention is drawn to the possibi
13、lity that some of the elements of this document may be the subject of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. ISO/IEC 20009-1 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Securi
14、ty techniques. ISO/IEC 20009 consists of the following parts, under the general title Information technology Security techniques Anonymous entity authentication: Part 1: General Part 2: Mechanisms based on signatures using a group public key The following parts are under preparation: Part 3: Mechani
15、sms based on blind signatures Part 4: Mechanisms based on weak secrets Further parts may follow.iv ISO/IEC 2013 All rights reservedBS ISO/IEC 20009-1:2013ISO/IEC 20009-1:2013(E) Introduction Authenticating communicating partners is one of the most important cryptographic services. There are a wide v
16、ariety of cryptographic mechanisms supporting this service, e.g. the entity authentication mechanisms specified in ISO/IEC 9798 2and the digital signature mechanisms specified in ISO/IEC 9796 1and ISO/IEC 14888. 4 Anonymous authenticated communication involves hiding the identifier of an authenticat
17、ed entity to its communicating partner and/or to a third party, while retaining the property that a verifier can reliably determine that its communication partner is authentic. Anonymous entity authentication mechanisms are designed to support such anonymous communications. The mechanisms are define
18、d as exchanges of information between entities and, where required, exchanges with a trusted third party. In an anonymous entity authentication mechanism, the entity to be authenticated (the claimant) provides evidence to a verifier that it has knowledge of a secret without revealing its identifier
19、to any unauthorized entity. That is, given complete knowledge of the messages exchanged between the parties, an unauthorized entity cannot discover the identifier of the entity being authenticated (i.e. the claimant). At the same time, an authorized verifier can obtain assurance that the claimant is
20、 authentic, i.e. that it possesses certain attributes, e.g. membership of a predefined group of entities. However, even an authorized verifier may not be authorized to learn the identifier of the entity being authenticated. Anonymous entity authentication mechanisms may permit an authorized party to
21、 perform opening, a process which enables the authorized party to learn the identity of the entity that engaged in a particular instance of the mechanism. Mechanisms which permit opening are referred to as partially anonymous entity authentication mechanisms. Anonymous entity authentication can be a
22、pplied in a range of scenarios including electronic business, electronic voting, electronic identities (such as e-driving licences, e-health IDs and e-passports), social networks, mobile payments and trusted computing. In many such services, a clients personally identifiable information (PII) is rev
23、ealed to a service provider as part of the authentication process. As a result the service provider may be in a position to use the PII for a range of purposes, not necessarily in the interests of the PII subject. One way of restricting access by service providers to PII is through the use of anonym
24、ous authentication mechanisms. Some use cases of anonymous entity authentication are described in Annex A of ISO/IEC 29191:2012. 6 ISO/IEC 20009 specifies a general model and a number of mechanisms for anonymous entity authentication. The details of the mechanisms and the contents of the authenticat
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BSISOIEC2000912013INFORMATIONTECHNOLOGYSECURITYTECHNIQUESANONYMOUSENTITYAUTHENTICATIONGENERAL 信息技术 安全技术

链接地址:http://www.mydoc123.com/p-396550.html