ISO/IEC 23264-2:2024 PDF

ISO/IEC 23264-2:2024 PDF

Name:
ISO/IEC 23264-2:2024 PDF

Published Date:
08/01/2024

Status:
Active

Description:

Information security - Redaction of authentic data - Part 2: Redactable signature schemes based on asymmetric mechanisms

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$75
Need Help?
This document specifies cryptographic mechanisms to redact authentic data. The mechanisms described in this document offer different combinations of the security properties defined and described in ISO/IEC 23264-1. For all mechanisms, this document describes the processes for key generation, generating the redactable attestation, carrying out redactions and verifying redactable attestations.

This document contains mechanisms that are based on asymmetric cryptography using three related transformations:
— a public transformation defined by a verification key (verification process for verifying a redactable attestation),
— a private transformation defined by a private attestation key (redactable attestation process for generating a redactable attestation), and
— a third transformation defined by the redaction key (redaction process) allowing to redact authentic information within the constraints set forth during generation of the attestation such that redacted information cannot be reconstructed.

This document contains mechanisms which, after a successful redaction, allow the attestation to remain verifiable using the verification transformation and attest that non-redacted fields of the attested message are unmodified. This document further details that the three transformations have the property whereby it is computationally infeasible to derive the private attestation transformation, given the redaction and or the verification transformation and key(s).
File Size : 1 file , 5 MB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 08/01/2024

History


Related products

ISO/IEC 27005:2022
Published Date: 09/30/2022
Information security, cybersecurity and privacy protection -- Guidance on managing information security risks
$75
ISO/IEC 29100:2024
Published Date: 02/01/2024
Information technology - Security techniques - Privacy framework
$49.8
ISO/IEC 27000:2018
Published Date: 02/01/2018
Information technology - Security techniques - Information security management systems - Overview and vocabulary
$58.2

Best-Selling Products

AS/NZS 10002:2014
Published Date: 10/29/2014
Guidelines for complaint management in organizations
$31.68
AS/NZS 1015:2011
Published Date: 10/07/2011
Records management - Physical storage
$21.582
AS/NZS 1020:1995
Published Date: 03/05/1995
The control of undesirable static electricity
$36.63
AS/NZS 1020:2023
Published Date: 06/02/2023
The control of static electricity in non-hazardous areas
$23.166
AS/NZS 1026:2004
Published Date: 04/29/2004
Electric cables - Impregnated paper insulated - For working voltages up to and including 19/33 (36) kV
$30.492
AS/NZS 1044:1992
Published Date: 08/17/1992
Limits and methods of measurement of radio interference characteristics of household electrical appliances, portable tools and similar electrical apparatus
$33.264