Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.

ISO/IEC 29191:2012 provides a framework and establishes requirements for partially anonymous, partially unlinkable authentication.

Technologies de l'information — Techniques de sécurité — Exigences pour l'authentification partiellement anonyme, partiellement non reliable

General Information

Status
Published
Publication Date
05-Dec-2012
Current Stage
9060 - Close of review
Start Date
04-Jun-2029
Ref Project

Buy Standard

Standard
ISO/IEC 29191:2012 - Information technology -- Security techniques -- Requirements for partially anonymous, partially unlinkable authentication.
English language
9 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

INTERNATIONAL ISO/IEC
STANDARD 29191
First edition
2012-12-15


Information technology — Security
techniques — Requirements for partially
anonymous, partially unlinkable
authentication
Technologies de l'information — Techniques de sécurité — Exigences
pour l'authentification partiellement anonyme, partiellement non reliable




Reference number
ISO/IEC 29191:2012(E)
©
ISO/IEC 2012

---------------------- Page: 1 ----------------------
ISO/IEC 29191:2012(E)

COPYRIGHT PROTECTED DOCUMENT


©  ISO/IEC 2012
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56  CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland

ii © ISO/IEC 2012 – All rights reserved

---------------------- Page: 2 ----------------------
ISO/IEC 29191:2012(E)
Contents Page
Foreword . iv
Introduction . v
1  Scope . 1
2  Terms and definitions . 1
3  General . 2
4  Framework . 2
5  Requirements . 4
Annex A (informative) Use cases . 5
Annex B (informative) Application of the mechanism for the purpose of data authentication and
data protection . 7
Bibliography . 9

© ISO/IEC 2012 – All rights reserved iii

---------------------- Page: 3 ----------------------
ISO/IEC 29191:2012(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC should not be held responsible for identifying any or all such patent rights.
ISO/IEC 29191 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
subcommittee SC 27, IT Security techniques.
iv © ISO/IEC 2012 – All rights reserved

---------------------- Page: 4 ----------------------
ISO/IEC 29191:2012(E)
Introduction
The current state of the art for entity authentication requires the revelation of the identifiable information of an
entity being authenticated. In many types of transactions, the entity would prefer to remain anonymous and
unlinkable, which means that when two transactions are performed, it is difficult to distinguish whether the
transact
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.