-
-
Available Formats
- Options
- Availability
- Priced From ( in USD )
-
Available Formats
-
- Immediate download
- $240.00
- Add to Cart
-
- Printed Edition
- Ships in 1-2 business days
- $276.00
- Add to Cart
Customers Who Bought This Also Bought
-
ISO/TS 15000-4:2004
Priced From $123.00 -
ISO 26430-5:2009
Priced From $166.00 -
ISO/IEC 15421:2010
Priced From $81.00 -
ISO/IEC TR 19763-9:2015
Priced From $124.00
About This Item
Full Description
ISO/IEC 14888-3:2006 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. It provides a general description of a digital signature with appendix mechanism, and a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, ISO/IEC 14888-3:2006 specifies the process of generating keys, the process of producing signatures, and the process of verifying signatures.
The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association may be provided by another means that is not covered in ISO/IEC 14888-3:2006. Whatever the nature of such means, the scheme is then said to be 'certificate-based'. If not, the association between the correct verification key and the signing entity's identification data is somehow inherent in the verification key itself. In such a case, the scheme is said to be 'identity-based'. Depending on the two different ways of checking the correctness of the verification keys, the digital signature mechanisms specified in ISO/IEC 14888-3:2006 are categorized in two groups: certificate-based and identity-based.
Document History
-
ISO/IEC 14888-3:2018
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms- Most Recent
-
ISO/IEC 14888-3:2016
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms- Historical Version
-
ISO/IEC 14888-3:2006
viewing
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms- Historical Version
-
ISO/IEC 14888-3:1998
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms- Historical Version
Amendments, rulings, supplements, and errata
-
ISO/IEC 14888-3/Amd2:2012
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Amendment 2: Optimizing hash inputs -
ISO/IEC 14888-3/Amd1:2010
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full S -
ISO/IEC 14888-3/Cor2:2009
Download
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Corrigendum -
ISO/IEC 14888-3 Ed. 1.0 en CORR2:2009
Download
Corrigendum 2 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - -
ISO/IEC 14888-3 Ed. 1.0 en CORR1:2007
Download
Corrigendum 1 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - -
ISO/IEC 14888-3/Cor1:2007
Download
Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Corrigendum