INCITS/ISO/IEC 9798-5 : 2010
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES
Hardcopy , PDF
12-18-2020
English
01-01-2010
Foreword
Introduction
1 Scope
2 Terms and definitions
3 Notation, symbols and
abbreviated terms
4 Mechanisms based on identities
5 Mechanisms based on integer
factorization
6 Mechanisms based on discrete
logarithms with respect to prime
numbers
7 Mechanisms based on discrete
logarithms with respect to
composite numbers
8 Mechanisms based on asymmetric
encryption systems
9 Mechanism based on discrete logarithms
with respect to elliptic curves
Annex A (normative) - Object identifiers
Annex B (informative) - Principles of
zero-knowledge techniques
Annex C (informative) - Guidance on parameter
choice and comparison of the mechanisms
Annex D (informative) - Numerical examples
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.