GB/T 15843.5-2005
Information technology.Security techniques.Entity authentication.Part 5:Mechanisms using zero knowledge techniques (English Version)

Standard No.
GB/T 15843.5-2005
Language
Chinese, Available in English version
Release Date
2005
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Latest
GB/T 15843.5-2005
Scope
This part of GB/T 15843 specifies three entity authentication mechanisms using zero-knowledge technology. All mechanisms described in this part of GB/T 15843 provide one-way authentication. These mechanisms are constructed using zero-knowledge principles, but all parameters are chosen according to the strict definition in Appendix A. The mechanisms themselves are not zero-knowledge. The first mechanism is called an identity-based mechanism. Trusted accreditation agencies provide private accreditation information for each claimant. The private authorization information is computed as a function of the claimant's identification data and the authorization authority's private code. The second mechanism is called a certificate-based mechanism based on the use of discrete logarithms. Each claimant has a pair of public and private keys used for this mechanism. Every verifier of a claimant's identity must possess a trusted copy of the claimant's public verification key; the method of obtaining this is outside the scope of this standard, but it can be obtained through the distribution of certificates signed by a trusted third party . The third mechanism is called a certificate-based mechanism based on the use of an asymmetric encryption system. Each claimant has a pair of public key and private key pair for asymmetric encryption system. Every verifier of a claimant's identity must possess a trusted copy of the claimant's public verification key; the method of obtaining this is outside the scope of this International Standard, but may be obtained through distribution of certificates signed by trusted third parties.

GB/T 15843.5-2005 Referenced Document

  • GB 15851-1995 Information technology--Security techniques--Digital signature scheme giving message recovery
  • GB/T 15843.1-1999 Information technology-Security techniques-Entity authentication-Part 1: General
  • GB/T 18238.1 Information technology-Security techniques-Hash-function-Part 1:General
  • GB/T 18238.2 Information technology--Security techniques--Hash-functions Part 2:Hash-functions using an n-bit block cipher
  • GB/T 18238.3 Information technology--Security techniques--Hash-functions Part 3:Dedicated hash-functions

GB/T 15843.5-2005 history

  • 2005 GB/T 15843.5-2005 Information technology.Security techniques.Entity authentication.Part 5:Mechanisms using zero knowledge techniques
Information technology.Security techniques.Entity authentication.Part 5:Mechanisms using zero knowledge techniques

GB/T 15843.5-2005 -All Parts




Copyright ©2024 All Rights Reserved