GB/T 17903.3-2008
Information technology. Security techniques. Non-repudiation. Part 3: Mechanisms using asymmetric techniques (English Version)

Standard No.
GB/T 17903.3-2008
Language
Chinese, Available in English version
Release Date
2008
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Status
 2024-10
Replace By
GB/T 17903.3-2024
Latest
GB/T 17903.3-2024
Replace
GB/T 17903.3-1999
Scope
Non-repudiation services are designed to generate, collect, maintain, utilize and verify evidence about a generated event or action in order to resolve disputes about that event or action having occurred or not occurred. This section specifies mechanisms for providing some specific communication-related non-repudiation services using asymmetric techniques. The non-repudiation mechanism can provide the following four non-repudiation services: a) origination non-repudiation; b) delivery non-repudiation; c) submission non-repudiation; d) transmission non-repudiation. The non-repudiation mechanism involves the exchange of non-repudiation tokens specified by various non-repudiation services. A non-repudiation token consists of a digital signature and additional data. Non-repudiation tokens can be stored as non-repudiation information for later use in case of disputes. Depending on the effective non-repudiation strategy for a specific application and the legal environment in which the application operates, the non-repudiation information may include the following additional information: a) Evidence including credible timestamps provided by timestamp agencies; b) Notaries provided evidence to assure that an action or event was performed or participated in by one or more entities. Non-repudiation can only be effective within a specific application and its legal environment, within the scope of a clearly defined security policy.

GB/T 17903.3-2008 Referenced Document

  • GB 15851-1995 Information technology--Security techniques--Digital signature scheme giving message recovery
  • GB/T 16264.8-2005 Information technology.Open Systems Interconnection.The Directory.Part 8:Public-key and attribute certificate frameworks
  • GB/T 17902.1 Information Technology Security Techniques Digital Signatures with Appendix Part 1: Overview*2023-03-17 Update
  • GB/T 17902.2 Information technology-Security techniques-Digital signatures with appendix-Part 2:Identity-based mechanisms
  • GB/T 17902.3 Information technology-Decurity techniques-Digital signatures with appendix-Part 3:Certificate-based mechanisms
  • GB/T 17903.1-2008 Information technology. Security techniques. Non-repudiation. Part 1: General
  • GB/T 18794.1-2002 Information technology--Open systems Interconnection-Security frameworks for open systems--Part 1: Overview
  • GB/T 18794.4-2003 Information technology-Open Systems Interconnection-Security frameworks for open systems-Part 4:Non-repudiation framework
  • GB/T 9387.2-1995 Information processing systems--Open Systems Interconnection--Basic Reference Model--Part 2: Security architecture

GB/T 17903.3-2008 history

  • 2024 GB/T 17903.3-2024 Information technology Security technology Non-repudiation Part 3: Mechanisms using asymmetric technology
  • 2008 GB/T 17903.3-2008 Information technology. Security techniques. Non-repudiation. Part 3: Mechanisms using asymmetric techniques
  • 1999 GB/T 17903.3-1999 Information technology-Security techniques-Non-repudiation-Part 3: Mechanisms using asymmetric techniques
Information technology. Security techniques. Non-repudiation. Part 3: Mechanisms using asymmetric techniques

GB/T 17903.3-2008 -All Parts




Copyright ©2024 All Rights Reserved