ISO/IEC 20008-2:2013

Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key ISO/IEC 20008-2:2013

Publication date:   Nov 13, 2013

General information

90.20 Standard under periodical review   Apr 15, 2024

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Buying

Published

Language in which you want to receive the document.

Scope

ISO/IEC 20008-2:2013 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
It provides

a general description of an anonymous digital signature mechanism using a group public key;
a variety of mechanisms that provide such anonymous digital signatures.

For each mechanism, ISO/IEC 20008-2:2013 specifies

the process for generating group member signature keys and a group public key;
the process for producing signatures;
the process for verifying signatures;
the process for opening signatures (if the mechanism supports opening);
the process for linking signatures (if the mechanism supports linking);
the process for revoking group members.

Life cycle

NOW

PUBLISHED
ISO/IEC 20008-2:2013
90.20 Standard under periodical review
Apr 15, 2024

CORRIGENDA / AMENDMENTS

PUBLISHED
ISO/IEC 20008-2:2013/Amd 1:2021

PUBLISHED
ISO/IEC 20008-2:2013/Amd 2:2023

REVISED BY

ABANDON
ISO/IEC WD 20008-2