Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key - Amendment 1

Technologies de l'information — Techniques de sécurité — Signatures numériques anonymes — Partie 2: Mécanismes utilisant une clé publique de groupe — Amendement 1

General Information

Status
Published
Publication Date
15-Feb-2021
Current Stage
6060 - International Standard published
Start Date
16-Feb-2021
Due Date
12-Jun-2021
Completion Date
16-Feb-2021

Relations

Effective Date
04-Sep-2021

Overview

ISO/IEC 20008-2:2013/Amd 1:2021 is an important amendment to the international standard focusing on information technology security. This standard specifically addresses anonymous digital signatures, with emphasis on mechanisms that utilize a group public key. It is developed by the Joint Technical Committee ISO/IEC JTC 1, Subcommittee SC 27, which specializes in information security, cybersecurity, and privacy protection.

The amendment enhances the original 2013 edition by adding object identifiers, defining special hash functions, introducing comprehensive security guidelines, comparing revocation mechanisms, and providing numerical examples for the digital signature mechanisms. It also includes a technique for proof of correct generation for certain signature mechanisms and clarifies restrictions on the use of specific mechanisms.

Key Topics

  • Anonymous Digital Signatures: Techniques enabling users to sign digital data without revealing their identity, preserving privacy and anonymity.
  • Group Public Key Mechanisms: Cryptographic methods that use a shared group key to validate signatures while ensuring anonymity within the group.
  • Object Identifiers (OIDs): Unique identifiers specified for the anonymous digital signature mechanisms to standardize implementation and interoperability.
  • Special Hash Functions: Defined for use within these mechanisms to ensure secure and reliable digital signature generation and verification.
  • Security Guidelines: Best practices and considerations for securely implementing anonymous digital signature schemes.
  • Revocation Mechanisms: Methods for managing and invalidating membership or signing rights, vital for maintaining group security.
  • Numerical Examples: Practical illustrations of signature generation and verification to assist developers and implementers.
  • Proof of Correct Generation: Techniques ensuring that signatures are reliably produced according to the defined standards.
  • Usage Restrictions: Clarifications on particular mechanisms, such as Mechanism 6, which should only be used where the issuer and opener are the same trusted entity, to prevent risks to anonymity.

Applications

ISO/IEC 20008-2:2013/Amd 1:2021 serves as a foundational resource for organizations and developers implementing secure anonymous digital signature systems where group-based identity management is required. Practical applications include:

  • Privacy-Preserving Authentication: Enabling anonymous credentials in digital identity systems, protecting user privacy while allowing verification.
  • Secure Group Communications: Facilitating confidential signing in group environments such as online committees, boards, and federations.
  • E-Governance and Voting Systems: Providing secure, anonymous digital signatures for electronic ballots and decision-making while preventing fraud.
  • Confidential Transactions: Enabling financial and contractual signing where signer anonymity is critical.
  • Access Control and Authorization: Where group-based credentials control access without revealing individual identities.

Related Standards

  • ISO/IEC 20008-1:2013 - Information technology – Security techniques – Anonymous digital signatures – Part 1: General (provides overarching principles).
  • ISO/IEC 27000-series - Information security management systems and technologies related to security governance.
  • Other cryptographic standards developed by ISO/IEC JTC 1/SC 27 addressing privacy, authentication, and digital signature techniques.

This amendment builds upon the existing framework by refining the mechanisms ensuring stronger security, enhanced interoperability, and practical clarifications to support wider adoption in security-sensitive applications. For further technical details and updates, refer to the ISO website and the ISO patent declarations relevant to these cryptographic techniques.

Standard

ISO/IEC 20008-2:2013/Amd 1:2021 - Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1 Released:2/16/2021

English language
1 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/IEC 20008-2:2013/Amd 1:2021 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key - Amendment 1". This standard covers: Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key - Amendment 1

Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key - Amendment 1

ISO/IEC 20008-2:2013/Amd 1:2021 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.

ISO/IEC 20008-2:2013/Amd 1:2021 has the following relationships with other standards: It is inter standard links to ISO/IEC 20008-2:2013. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.

ISO/IEC 20008-2:2013/Amd 1:2021 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 20008-2
First edition
2013-11-15
AMENDMENT 1
2021-02
Information technology — Security
techniques — Anonymous digital
signatures —
Part 2:
Mechanisms using a group public key
AMENDMENT 1
Technologies de l'information — Techniques de sécurité — Signatures
numériques anonymes —
Partie 2: Mécanismes utilisant une clé publique de groupe
AMENDEMENT 1
Reference number
ISO/IEC 20008-2:2013/Amd.1:2021(E)
©
ISO/IEC 2021
ISO/IEC 20008-2:2013/Amd.1:2021(E)

© ISO/IEC 2021
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2021 – All rights reserved

ISO/IEC 20008-2:2013/Amd.1:2021(E)

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that
are members of ISO or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal with particular fields of
technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also
take part in the work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www .iso .org/ patents) or th
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...