GSO ISO/IEC 14888-3:2010
ISO/IEC 14888-3:2006
Gulf Standard
Historical
·
Approved on
31 October 2010
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
GSO ISO/IEC 14888-3:2010 Files
English
68 Pages
Historical
Reference Language
Obtaining this standard through the store is currently unavailable.
You can acquire it directly from its source or from one of the member countries stores
GSO ISO/IEC 14888-3:2010 Scope
This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on
the discrete logarithm problem. This part of ISO/IEC 14888 provides
- a general description of a digital signature with appendix mechanism;
- a variety of mechanisms that provide digital signatures with appendix.
For each mechanism, this part of ISO/IEC 14888 specifies
- the process of generating a pair of keys;
- the process of producing signatures;
- the process of verifying signatures.
The verification of a digital signature requires the signing entity’s verification key. It is thus essential for a
verifier to be able to associate the correct verification key with the signing entity, or more precisely, with (parts
of) the signing entity’s identification data. This association between the signer’s identification data and the
signer’s public verification key can either be guaranteed by an outside entity or mechanism, or the association
can be somehow inherent in the verification key itself. In the former case, the scheme is said to be “certificatebased.”
In the latter case, the scheme is said to be “identity based.” Typically, in an identity-based scheme,
the verifier can derive the signer’s public verification key from the signer’s identification data. The digital
signature mechanisms specified in this part of ISO/IEC 14888 are classified into certificate-based and identitybased
mechanisms.
NOTE – For certificate-based mechanisms, various PKI standards can be used for key management. For further
information, see ISO/IEC 11770-3, ISO/IEC 9594-8 (also known as X.509) and ISO/IEC 15945.
Best Sellers From Information Sector
GSO ISO/TR 18492:2017
ISO/TR 18492:2005
Gulf Standard
Long-term preservation of electronic document-based information


GSO ISO/TS 23635:2024
ISO/TS 23635:2022
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance


GSO ISO/IEC 15773:2013
ISO/IEC 15773:1998
Gulf Standard
Information technology -- Telecommunications and information exchange between systems -- Broadband Private Integrated Services Network -- Inter-exchange signalling protocol -- Transit counter additional network feature



GSO ISO 11238:2017
ISO 11238:2012
Gulf Standard
Health informatics -- Identification of medicinal products -- Data elements and structures for the unique identification and exchange of regulated information on substances


Recently Published from Information Sector
GSO ISO/IEC TS 20000-5:2025
ISO/IEC TS 20000-5:2022
Gulf Standard
Information technology — Service management — Part 5: Implementation guidance for ISO/IEC 20000-1



GSO ISO/IEC/IEEE 42010:2025
ISO/IEC/IEEE 42010:2022
Gulf Standard
Software, systems and enterprise — Architecture description




GSO ISO/IEC 18033-7:2025
ISO/IEC 18033-7:2022
Gulf Standard
Information security — Encryption algorithms — Part 7: Tweakable block ciphers



GSO ISO/IEC 30179:2025
ISO/IEC 30179:2023
Gulf Standard
Internet of Things (IoT) — Overview and general requirements of IoT system for ecological environment monitoring


