Your cart is currently empty!

ISO 9798:2009
ISO 9798:2009 Information technology – Security techniques – Entity authentication – Part 5: Mechanisms using zero-knowledge techniques
CDN $351.00
SKU: 69be81a2ced1
Category: ICS:35.030
Description
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Edition
3
Published Date
2009-12-11
Status
PUBLISHED
Pages
53
Format 
Secure PDF
Secure – PDF details
- Save your file locally or view it via a web viewer
- Viewing permissions are restricted exclusively to the purchaser
- Device limits - 3
- Printing – Enabled only to print (1) copy
See more about our Environmental Commitment

Abstract
ISO/IEC 9798-5:2009 specifies entity authentication mechanisms using zero-knowledge techniques:
- mechanisms based on identities and providing unilateral authentication;
- mechanisms based on integer factorization and providing unilateral authentication;
- mechanisms based on discrete logarithms with respect to numbers that are either prime or composite, and providing unilateral authentication;
- mechanisms based on asymmetric encryption systems and providing either unilateral authentication, or mutual authentication;
- mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.
These mechanisms are constructed using the principles of zero-knowledge techniques, but they are not necessarily zero-knowledge according to the strict definition for every choice of parameters.
Previous Editions
Can’t find what you are looking for?
Please contact us at:
Related Documents
-
ISO 27001:2022 Information security, cybersecurity and privacy protection – Information security management systems – Requirements
0 out of 5CDN $233.00 Add to cart -
ISO 27562:2024 Information technology – Security techniques – Privacy guidelines for fintech services
0 out of 5CDN $273.00 Add to cart -
ISO 20008:2024 Information security – Anonymous digital signatures – Part 3: Mechanisms using multiple public keys
0 out of 5CDN $233.00 Add to cart -
ISO 20243:2023 Information technology – Open Trusted Technology ProviderTM Standard (O-TTPS) – Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
0 out of 5CDN $273.00 Add to cart