Skip to product information
1 of 4

www.ChineseStandard.us -- Field Test Asia Pte. Ltd.

GB/T 34953.4-2020 English PDF (GB/T34953.4-2020)

GB/T 34953.4-2020 English PDF (GB/T34953.4-2020)

Regular price $325.00
Regular price Sale price $325.00
Sale Sold out
Shipping calculated at checkout.

GB/T 34953.4-2020: Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets

Delivery: 9 seconds. Download (and Email) true-PDF + Invoice.
Get Quotation: Click GB/T 34953.4-2020 (Self-service in 1-minute)
Newer / historical versions: GB/T 34953.4-2020

Preview True-PDF


Scope

This Part of GB/T 34953 specifies anonymous entity authentication
mechanisms based on weak secrets. The precise operation of each mechanism
is specified, together with details of all inputs and outputs.
This Part is applicable to situations in which the server only verifies that the user
belongs to a certain user group without obtaining any information that can be
used to identify the user later on.

Basic Data

Standard ID GB/T 34953.4-2020 (GB/T34953.4-2020)
Description (Translated English) Information technology - Security techniques - Anonymous entity authentication - Part 4: Mechanisms based on weak secrets
Sector / Industry National Standard (Recommended)
Classification of Chinese Standard L80
Classification of International Standard 35.040
Word Count Estimation 18,153
Date of Issue 2020-04-28
Date of Implementation 2020-11-01
Quoted Standard GB/T 15852.2; GB/T 34953.1; GB/T 36624-2018; ISO/IEC 11770-4-2006
Adopted Standard ISO/IEC 20009-4-2017, MOD
Issuing agency(ies) State Administration for Market Regulation, China National Standardization Administration
Summary This standard specifies the anonymous entity authentication mechanism based on weak secrets, the specific operation steps of each mechanism and the detailed input and output. This standard is applicable to scenarios where the server verifies the user and confirms that it belongs to a specific user group without obtaining the specific identity information that can be used to identify the user.


View full details