Skip to product information
1 of 5

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GB/T 34953.2-2018 English PDF (GB/T34953.2-2018)

GB/T 34953.2-2018 English PDF (GB/T34953.2-2018)

Regular price $610.00 USD
Regular price Sale price $610.00 USD
Sale Sold out
Shipping calculated at checkout.
Delivery: 3 seconds. Download true-PDF + Invoice.
Get Quotation: Click GB/T 34953.2-2018 (Self-service in 1-minute)
Historical versions (Master-website): GB/T 34953.2-2018
Preview True-PDF (Reload/Scroll-down if blank)

GB/T 34953.2-2018: Information technology -- Security techniques -- Anonymous entity authentication -- Part 2: Mechanisms based on signatures using a group public key
GB/T 34953.2-2018
Information technology - Security techniques - Anonymous entity authentication - Part 2. Mechanisms based on signatures using a group public key
ICS 35.040
L80
National Standards of People's Republic of China
Information technology security technology anonymous entity authentication
Part 2. Mechanism based on group public key signature
Part 2.Mechanismsbasedonsignaturesusingagrouppublickey
(ISO /IEC .20009-2.2013, IDT)
Published on.2018-09-17
Implementation of.2019-04-01
State market supervision and administration
China National Standardization Administration issued
Content
Foreword III
Introduction IV
1 range 1
2 Normative references 1
3 Terms and Definitions 1
4 symbols and abbreviations 3
5 models and requirements 4
6 key generation process 4
7 Anonymous authentication mechanism without online trusted third party participation 5
7.1 Overview 5
7.2 One-way anonymous authentication 6
7.3 Two-way anonymous authentication 7
7.4 One-way anonymous two-way authentication 10
7.5 Two-way anonymous authentication with binding characteristics 12
7.6 One-way anonymous two-way authentication with binding characteristics 17
8 Anonymous authentication mechanism with online trusted third party participation 22
8.1 Overview 22
8.2 One-way anonymous authentication 22
8.3 Two-way anonymous authentication 25
8.4 One-way anonymous two-way authentication 28
9 group member open process 35
9.1 General 35
9.2 Evidence Evaluation Process 36
10 Group Signature Connection Process 36
10.1 General 36
10.2 Connection Process with Open Party 36
10.3 Connection Process with Connection Keys 37
10.4 Connection process with connection library 37
Appendix A (Normative) Object identifier 38
Appendix B (informative) Information on mechanisms with binding properties 39
Reference 40
Foreword
GB/T 34953 "Information Technology Security Technology Anonymous Entity Authentication" has been released or plans to release the following sections.
--- Part 1. General;
--- Part 2. Mechanism based on group public key signature;
--- Part 3. Mechanism based on blind signature;
--- Part 4. Mechanism based on weak secrets.
This part is the second part of GB/T 34953.
This part is drafted in accordance with the rules given in GB/T 1.1-2009.
This part uses the translation method equivalent to ISO /IEC .20009-2.2013 "Information Technology Security Technology Anonymous Entity Identification Part 2
Part. Mechanism based on group public key signature.
The documents of our country that have a consistent correspondence with the international documents referenced in this part are as follows.
--- GB/T 34953.1-2017 Information technology security technology - Anonymous entity identification - Part 1. General (ISO /IEC
20009-1.2013, IDT).
This part is proposed and managed by the National Information Security Standardization Technical Committee (SAC/TC260).
This section drafted by. Xi'an Xidian Jietong Wireless Network Communications Co., Ltd., National Engineering Laboratory for Wireless Network Security Technology,
WAPI Industry Alliance (Zhongguancun Wireless Network Security Industry Alliance), National Cryptographic Authority Commercial Password Testing Center, Chongqing University of Posts and Telecommunications,
National Radio Monitoring Center Testing Center, China Electronics Technology Standardization Research Institute, Tianjin Radio Monitoring Station, China General Technology Research
Institute, Peking University Shenzhen Graduate School, Institute of Software, Chinese Academy of Sciences, National Computer Network Emergency Technology Processing Coordination Center, China Network
Space Research Institute, National Information Technology Security Research Center, National Information Security Engineering Technology Research Center, Information Security of the People's Liberation Army
Evaluation and Certification Center, the Third Institute of the Ministry of Public Security, Beijing Institute of Computer Technology and Applications, Fujian Radio Monitoring Station, Beijing Digital Certification
Co., Ltd., China Telecom Corporation Shanghai Research Institute, Ministry of Industry and Information Technology Broadband Wireless IP Standards Working Group.
The main drafters of this section. Du Zhiqiang, Cao Jun, Huang Zhenhai, Li Dawei, Song Qizhu, Li Qin, Long Zhaohua, Feng Dengguo, Shu Min, Chen Xiaohua,
Li Jingchun, Ge Peiqin, Guo Xiaolei, Gao Bo, Zhu Yuesheng, Li Guangsen, Gu Jian, Li Nan, Yu Guangming, Zhang Wei, Tie Manxia, Zhang Lingling, Xu Yuna,
Hu Yanan, Yan Xiang, Zhang Guoqiang, Tong Weigang, Li Ming, Wan Hongtao, Wang Yuehui, Zheng Yi, Peng Yu, Zhu Zhengmei, Chen Zhiyu, Hou Pengliang, Xu Fuming.
introduction
This part of GB/T 34593 defines an anonymous entity authentication mechanism based on group public key signature, which is divided into online trusted third party parameters.
There are two types of authentication mechanisms and authentication mechanisms that do not involve online trusted third parties.
The issuing body of this document draws attention to the fact that, when the statement conforms to this document, it may involve Chapter 8 and ZL201010546339.3,
ZL201010546320.9, CN201210063055.8, CN201210063632.3, CN201210063650.1, ZL200910024191.4,
Use of related patents such as ZL200910023774.5 and ZL200910023735.5.
The issuing organization of this document has no position on the authenticity, validity and scope of the patent.
The holder of the patent has assured the issuing authority of this document that he is willing to work with any applicant on reasonable and non-discriminatory terms and conditions.
Licensing for negotiation. The patent holder's statement has been filed with the issuing authority of this document. Information can be obtained by contacting.
Patent holder name. Xi'an Xidian Jietong Wireless Network Communication Co., Ltd.
Address. A201, Qinfeng Pavilion, Xi'an Software Park, No. 68, Science and Technology Second Road, High-tech Zone, Xi'an
Contact. Feng Yuchen
Postal code. 710075
Email. ipri@iwncomm.com
Phone. 029-87607836
Fax. 029-87607829
The issuing organization of this document draws attention to the fact that this document is equivalent to ISO /IEC .20009-2.2013, therefore, in addition to the above statement, Korea
The Institute of Electronics and Telecommunications, Intel Corporation for ISO /IEC .20009-2.2013, "patent holders are willing to be based on non-discrimination and reasonable
The statement that the terms and conditions are negotiated with other parties is applicable to this document. Relevant information can be obtained by contacting.
Patent holder name. Electronics andTelecommunicationsResearchInstitute
Address. 161, Gajeong-dong, Yuseong-gu, Daejeon, 305-700, KOREA
Contact. HanchulShin
Email. vip123@etri.ke.kr
Phone. 82-042-860-5797
Fax. 82-042-860-3831
Patent Holder Name. Intel Corporation
Address. IntelLegaland CorporationAffairs2200 MissionColegeBlvd., RNB-150, SantaClara,
CA95054
Contact. JamesKovacs
Email. Standards.Licensing@intel.com
Phone. 408-765-1170
Fax. 408-613-7292
Please note that in addition to the above patents, certain aspects of this document may still involve patents. The issuing organization of this document does not undertake to identify these special
Liability.
Information technology security technology anonymous entity authentication
Part 2. Mechanism based on group public key signature
1 Scope
This part of GB/T 34953 defines an anonymous entity authentication mechanism based on group public key signature. The authenticator is based on the group signature mechanism.
Verify the validity of the peer identity and do not need to obtain the identity information of the peer.
This section specifies.
--- A general description of the anonymous entity authentication mechanism based on group public key signature;
--- A variety of anonymous authentication mechanisms.
This section describes.
---Group member publishing process;
---Anonymous entity authentication mechanism without online trusted third party participation;
--- An anonymous entity authentication mechanism with online trusted third party participation.
In addition, this section also specifies.
--- The process of group membership opening (optional);
--- The process of group member signature connection (optional).
2 Normative references
The following documents are indispensable for the application of this document. For dated references, only dated versions apply to this article.
Pieces. For undated references, the latest edition (including all amendments) applies to this document.
ISO /IEC .20008-1 Information technology security technology - Anonymous signature service - Part 1. General
technology-Securitytechniques-Anonymousdigitalsignatures-Part 1.General)
ISO /IEC .20008-2 Information technology security technology - Anonymous signature service - Part 2. Mechanisms using group public keys (Infor-
mationtechnology-Securitytechniques-Anonymousdigitalsignatures-Part 2.Mechanismsusinga
Grouppublickey)
ISO /IEC .20009-1 Information technology security technology - Anonymous entity authentication - Part 1. General
technology-Securitytechniques-Anonymousentityauthentication-Part 1.General)
3 Terms and definitions
The following terms and definitions defined by ISO /IEC .20008-1 and ISO /IEC .20009-1 apply to this document.
3.1
Binding property binding-property
An attribute that provides binding guarantees between messages of a communicating entity.
3.2
Certification authority
Trusted entity that creates and issues public key certificates.
[ISO /IEC 11770-1.2010, Definition 2.3]
3.3
Temporary key pair ephemeralkeypair
An asymmetric key pair consisting of a temporary public key and a temporary private key. The temporary public key and the temporary private key are paired with one encryption side.
Each execution of the case is unique.
3.4
Group public key certificate grouppublickeycertificate
The public key information of the group issued by the certificate authority.
3.5
Group public key certification authority grouppublickeycertificationauthority
An entity that is trusted to create and assign a group public key certificate.
3.6
Group public key information grouppublickeyinformation
The information includes at least a group distinguishable identifier and a group public key, and can also include a group public key certificate authority, a group, and a key.
Use static information such as restrictions, expiration dates, and related algorithms.
3.7
Key export function keyderivationfunction
The shared secret and other mutually known parameters are input as inputs, and a function of one or more shared secrets used as keys is output.
[ISO /IEC 11770-3.2015, definition 3.22]
3.8
Local connectivity ability locallinkingcapability
The connection capability is as follows. two or more signatures originating from the same anonymous user are only passed by a specific group signature connector.
A connection key connection is made, and other entities cannot connect to the above signature.
3.9
Message authentication code messageauthenticationcode;MAC
The bit string output by the message authentication code algorithm.
[ISO /IEC 9797-1.2011, definition 3.9]
3.10
Message authentication code (MAC) algorithm messageauthenticationcode(MAC) algorithm
An algorithm for computing a function that maps a bit string and a secret key into fixed-length bit strings and satisfies the following two properties.
--- For any key and any input string, this function can be effectively calculated;
--- For any fixed key, in the unknown case, even if the input string and the corresponding function value set are known (the ith
The value of the input string can be selected after observing the value of the i-1 function value before the observation), and the function value of any new input string is calculated.
It is not feasible to count.
[ISO /IEC 9797-1.2011, definition 3.10]
3.11
Public key certificate publickeycertificate
The public key information of the entity issued by the certificate authority.
[ISO /IEC 11770-1.2010, definition 2.37]
3.12
Public key information publickeyinformation
The information contains at least an entity distinguishable identifier and a public key, and can also contain information about the certification authority, entity, key usage restrictions,
Validity and other static information such as related algorithms.
[ISO /IEC 11770-1.2010, definition 2.38]
4 symbols and abbreviations
The following symbols and abbreviations apply to this document.
A distinguishable identifier of entity A
B. Distinguished identifier of entity B
CertA entity A's public key certificate
CertB entity B's public key certificate
Group public key certificate for CertG group G
G, G' distinguishable identifier of group G or G'
The G q-order cyclic group, in which the deterministic Diffie-Helman (DDH) problem is difficult to solve
Generator of g G
gsSXG(m) Entity X An anonymous signature generated using the group public key, which is the entity X that applies one of the provisions of this section.
Group signature mechanism, signature of the signature message m using the group member signature key SXG
The identity of the IG group G can be represented by G or CertG
IX The identity of group X, which can be represented by X or CertX
Kdf key export function
MAC message authentication code
m to be signed message
macK(M) MAC algorithm using key K and an arbitrary data string M
NX serial number issued by entity X
Public key of PA entity A
Public key of PB entity B
Group public key of PG group G
q prime number
ResA verifies the result of entity A's public or public key certificate
ResB verifies the result of entity B's public or public key certificate
ResG verifies the result of group public key or group public key certificate for group G
Random number generated by RX entity X
SXG Group member signature key associated with entity X, entity X is a member of group G
sSX(m) The digital signature generated by entity X with its signed private key on message m
Distingui...
View full details