Skip to product information
1 of 6

PayPal, credit cards. Download editable-PDF and invoice in 1 second!

GB/T 15843.5-2005 English PDF (GBT15843.5-2005)

GB/T 15843.5-2005 English PDF (GBT15843.5-2005)

Regular price $270.00 USD
Regular price Sale price $270.00 USD
Sale Sold out
Shipping calculated at checkout.
Delivery: 3 seconds. Download true-PDF + Invoice.
Get Quotation: Click GB/T 15843.5-2005 (Self-service in 1-minute)
Historical versions (Master-website): GB/T 15843.5-2005
Preview True-PDF (Reload/Scroll-down if blank)

GB/T 15843.5-2005: Information technology -- Security technique -- Entity authentication -- Part 5: Mechanisms using zero knowledge techniques
GB/T 15843.5-2005
Information technology.Security technique.Entity authentication.Part 5. Mechanisms using zero knowledge techniques
ICS 35.040
L80
National Standards of People's Republic of China
GB/T 15843.5-2005/ISO /IEC 9798-5.1999
Information technology security technology entity authentication
Part 5. Mechanisms using zero-knowledge technology
(ISO /IEC 9798-5..1999, IDT)
Released on.2005-04-19
Implemented.2005-10-01
General Administration of Quality Supervision, Inspection and Quarantine of the People's Republic of China
China National Standardization Administration issued
Content
Foreword III
1 range 1
2 Normative references 1
3 Terms and Definitions 1
4 symbols and signs 3
5 identity-based mechanism 4
5.1 Specific requirements 4
5.2 Parameter selection 5
5.3 Identity selection 5
5.4 Recognition produces 5
5.5 Identification Exchange 6
6 Certificate-based mechanisms using discrete logarithms 8
6.1 Specific requirements 8
6.2 Key Selection 8
6.3 Identification Exchange 8
7 Certificate-based mechanisms using asymmetric cryptosystems 9
7.1 Specific requirements 9
7.2 Identification exchange 10
Appendix A (informative) Principles of the zero-knowledge mechanism 12
A. 1 Introduction 12
A. 2 Zero knowledge mechanism needs 12
A. 3 Definition 13
A. 4 An example 13
A. 5 basic design principles 14
Appendix B (informative) Parameter Selection Guide 15
B. 1 Parameter selection of identity-based mechanisms 15
B. 2 Parameter selection using a discrete logarithmic certificate-based mechanism 15
Appendix 16 (Informative Appendix) Example 16
C. 1 Identity-based mechanism 16
C. 1.1 Example 16 with a public index of 2
C. 1.2 Example 19 with a public index of 3
C. 1.3 Example 23 with a public index of 216+1
C. 2 Discrete logarithm based mechanism 24
C. 3 Mechanism based on trusted public transformation 27
C. 3.1 Example 27 using 767-bit RSA and RIPEMD-160
C. 3.2 Example 28 using 1024-bit RSA and SHA-1
GB/T 15843.5-2005/ISO /IEC 9798-5.1999
Appendix D (informative) Mechanism comparison 30
D. 1 Metric comparison metric 30
D. 2 Identity-based mechanism 30
D. 2.1 When the situation is large (Guilou-Quisquater scheme) 30
D. 2.2 Fiat-Shamir programme 32
D. 3 Certificate-based mechanisms using discrete logarithms 32
D. 3.1 Computational complexity 32
D. 3.2 Communication Complexity 32
D. 3.3 Appellant's approved size 32
D. 3.4 Security Level 32
D. 4 Certificate-based mechanisms using asymmetric cryptosystems 33
D. 4.1 Computational complexity 33
D. 4.2 Communication Complexity 33
D. 4.3 The size of the claimant's approval 33
D. 4.4 Security Level 33
D. 5 Comparison of mechanisms 33
Appendix E (informative) Information on patents 35
Appendix F (informative) References 36
Figure 1 Identity-based mechanism 6
Figure 2 Mechanism based on discrete logarithm 8
Figure 3 Mechanism based on trusted public transformation 10
Table D. 1 Evaluation function 34
Table D. 2 Evaluation ratio of special parameter selection 34
GB/T 15843.5-2005/ISO /IEC 9798-5.1999
Foreword
GB/T 15843 "Information Technology Security Technology Entity Identification" consists of the following parts.
--- Part 1. Overview
--- Part 2. Mechanisms using symmetric encryption algorithms
--- Part 3. Mechanisms using digital signature technology
--- Part 4. The mechanism for using the password check function
--- Part 5. Mechanisms using zero-knowledge technology
This part is the fifth part of GB/T 15843, which is equivalent to the international standard ISO /IEC 9798-5..1999 "Information Technology Safety Technology"
Physical entity identification Part 5. Mechanisms using zero-knowledge technology (English version).
Appendix A, Appendix B, Appendix C, Appendix D, Appendix E and Appendix F of this part are informative annexes.
This part is proposed by the Ministry of Information Industry of the People's Republic of China
This part is under the jurisdiction of the National Information Security Standardization Technical Committee;
This part was drafted by China Electronics Technology Standardization Institute and State Key Laboratory of Information Security.
The main drafters of this section. Chen Xing, Luo Fengying, Hu Lei, Ye Dingfeng, Zhang Zhenfeng, Huang Jiaying.
GB/T 15843.5-2005/ISO /IEC 9798-5.1999
Information technology security technology entity authentication
Part 5. Mechanisms using zero-knowledge technology
1 range
This part of GB/T 15843 details three entity authentication mechanisms using zero-knowledge techniques. All in GB/T 15843
The mechanisms described in this section all provide one-way authentication. These mechanisms are constructed using the principle of zero knowledge, but are strictly based on Appendix A.
Righteousness, the choice of all parameters, these mechanisms are not zero-knowledge themselves.
The first mechanism is called an identity-based mechanism. A trusted accreditation body provides private endorsement information for each claimant.
The information is calculated as a function of the claimant's identification data and the authorized institution's private key.
The second mechanism is called a certificate-based mechanism based on the use of discrete logarithms. Every claimant has a pair of publics for this mechanism
Open key and private key pair. The verifier of each claimant must have a trusted copy of the claimant’s public verification key;
The method of taking is beyond the scope of this standard, but it can be obtained through the distribution of certificates signed by trusted third parties.
The third mechanism is called a certificate-based mechanism based on the use of asymmetric cryptosystems. Every claimant has a pair for non-pair
The public key and private key pair of the encryption system. The verifier of each claimant must have the claimant’s public verification key
Trusted copy; the method of obtaining it is beyond the scope of this standard, but can be distributed through a certificate signed by a trusted third party.
obtain.
2 Normative references
The terms of the following documents become the provisions of this part by reference in this part of GB/T 15843. Quotations with dated
, all subsequent amendments (not including errata content) or revisions do not apply to this section, however, encouragement is achieved under this section
The parties to the agreement study whether the latest versions of these documents can be used. For undated references, the latest edition applies to this
section.
GB 15851-1995 Information technology security technology Digital signature scheme with message recovery (idt ISO /IEC 9796.1991)
GB/T 15843.1-1999 Information technology security technology entity identification Part 1. Overview (idt ISO /IEC 9798-1.
1997)
GB/T 18238 (all parts) Information technology security technology hash function (idt ISO /IEC 10118)
3 Terms and definitions
The following terms and definitions established in GB/T 15843.1-1999 apply to this part of GB/T 15843.
3.1
3.2
3.3
3.4
3.5
GB/T 15843.5-2005/ISO /IEC 9798-5.1999

View full details