Skip to main content

ISO/IEC 14888-3:2006

Superseded Date published:

Warning: Superseded Standard. This document has been superseded without replacement. You may wish to search for a more up to date equivalent.

Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms

ISO/IEC 14888-3:2006 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. It provides a general description of a digital signature with appendix mechanism, and a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, ISO/IEC 14888-3:2006 specifies the process of generating keys, the process of producing signatures, and the process of verifying signatures.

The verification of a digital signature requires the signing entity's verification key. It is thus essential for a verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts of) the signing entity's identification data. This association may be provided by another means that is not covered in ISO/IEC 14888-3:2006. Whatever the nature of such means, the scheme is then said to be 'certificate-based'. If not, the association between the correct verification key and the signing entity's identification data is somehow inherent in the verification key itself. In such a case, the scheme is said to be 'identity-based'. Depending on the two different ways of checking the correctness of the verification keys, the digital signature mechanisms specified in ISO/IEC 14888-3:2006 are categorized in two groups: certificate-based and identity-based.

Get this standard Prices exclude GST
PDF ( Single user document)
$361.74 NZD
HardCopy
$406.09 NZD
Networkable PDF
Price varies

Keep me up-to-date

Register to receive notifications when updates are made to this standard.

Related Information

Similar Standards

  • AS/NZS ISO/IEC 27001:2023

    Information security, cybersecurity and privacy protection – Information security management systems – Requirements

  • AS/NZS ISO/IEC 27002:2022

    Information security, cybersecurity and privacy protection — Information security controls

  • AS/NZS ISO/IEC 27551:2024

    Information security, cybersecurity and privacy protection – Requirements for attribute-based unlinkable entity authentication

  • BS 10754-1:2018

    Information technology. Systems trustworthiness, Governance and management specification

ISO/IEC 14888-3:2006

Get this standard Prices exclude GST
PDF ( Single user document)
$361.74 NZD
HardCopy
$406.09 NZD
Networkable PDF
Price varies

Request to add this standard to your subscription

ISO/IEC 14888-3:2006

Price varies
Online library subscription

Click "Send request for subscription" to ask your Account Administrator to add this standard to your subscripiton.

Cancel