Information security - Anonymous digital signatures - Part 3: Mechanisms using multiple public keys
This document specifies anonymous digital signature mechanisms in which a verifier uses multiple public keys to verify a digital signature.
This document provides:
—    a general description of an anonymous digital signature mechanism using multiple public keys;
—    a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, this document specifies the process for:
—    generating the private key and public key of each user;
—    producing signatures;
—    verifying signatures;
—    linking signatures (if the mechanism supports linking);
—    tracing signatures (if the mechanism supports tracing);
—    producing signatures with threshold capability (if the mechanism supports a threshold capability);
—    verifying signatures with threshold capability (if the mechanism supports a threshold capability).
This document does not define the implementation of a public key infrastructure (PKI) and the means for distinct entities to exchange, extract and verify their respective public key certificates.
| SDO | ISO: International Organization for Standardization |
| Document Number | ISO/IEC 20008 |
| Publication Date | Not Available |
| Language | en - English |
| Page Count | |
| Revision Level | |
| Supercedes | |
| Committee | ISO/IEC JTC 1/SC 27 |