ImageVerifierCode 换一换
格式:PDF , 页数:32 ,大小:1.70MB ,
资源ID:804532      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-804532.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf)为本站会员(eastlab115)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf

1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1155 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols Guidelines on local linkable anonymous au

2、thentication for electronic services Recommendation ITU-T X.1155 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DI

3、RECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.

4、1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV

5、 security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 PKI related Recommendations X.1340X.1349 CYBERSEC

6、URITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1

7、580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud computing security design X.1602X.1639 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680X.1699 For f

8、urther details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1155 (10/2015) i Recommendation ITU-T X.1155 Guidelines on local linkable anonymous authentication for electronic services Summary In electronic services or e-services, there are various occasions where privacy violation

9、s are of concern. Service providers may gather users personal information in the processes of subscription, purchase or delivery. They may be able to access and exploit users personal data that is collected during the service processes. The consequences these threats pose to user privacy, such as pe

10、rsonal data leakage and tracking, are very serious emerging social issues. Therefore, technological solutions for preserving privacy in e-services are necessary. Anonymous authentication that allows users to be able to authenticate themselves without revealing their identity is the most fundamental

11、means of addressing the privacy threats associated with e-services. Recommendation ITU-T X.1155 provides guidelines on local linkable anonymous authentication for e-services. This includes the privacy threats of e-services, the requirements of local linkable anonymous authentication, the functions t

12、hat satisfy these requirements and a general model of local linkable anonymous authentication for e-services. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T X.1155 2015-10-29 17 11.1002/1000/12599 * To access the Recommendation, type the URL http:/handle.itu.int/ in the add

13、ress field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T X.1155 (10/2015) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, inf

14、ormation and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a w

15、orldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down i

16、n WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication adm

17、inistration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory pr

18、ovisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention

19、 to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others out

20、side of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the l

21、atest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2016 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.1155 (10/2015) iii Ta

22、ble of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 3 5 Conventions 3 6 Overview . 4 6.1 Privacy threats in e-services . 5 6.2 Complete anonymity and its side effects 5 6.3 Anonymous

23、 authentication . 6 7 Issues in anonymous authentication . 7 7.1 Traceability issues 7 7.2 Linkability issues 7 7.3 Local linkability issues of anonymous authentication mechanisms . 11 7.4 Anonymous authentication mechanisms and their properties 11 8 Requirements of anonymous authentication for subs

24、cription-based e-services . 12 8.1 Requirements for secure authentication . 12 8.2 Requirements for anonymity in subscription-based services . 13 8.3 Relationship between the requirements and privacy-related issues . 14 9 Framework of local linkable anonymous authentication for e-services . 15 9.1 E

25、ntities 15 9.2 Processes among the entities 16 9.3 Local linkable anonymous authentication mechanisms . 18 Appendix I Use cases 19 I.1 E-commerce use case . 19 I.2 E-voting use case 20 Bibliography. 23 Rec. ITU-T X.1155 (10/2015) 1 Recommendation ITU-T X.1155 Guidelines on local linkable anonymous a

26、uthentication for electronic services 1 Scope This Recommendation provides guidelines on local linkable anonymous authentication for electronic services. This Recommendation includes the following items: privacy threats of electronic services; requirements for local linkable anonymous authentication

27、; functions that satisfy the requirements; models of local linkable anonymous authentication for electronic services. 2 References None. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 anonymity b-ITU-T X.1252: A situation where an enti

28、ty cannot be identified within a set of entities. 3.1.2 (entity) authentication b-ITU-T X.1252: A process used to achieve sufficient confidence in the binding between the entity and the presented identity. 3.1.3 claimant b-ITU-T X.1252: An entity that is or represents a principal for the purposes of

29、 authentication. 3.1.4 identifier b-ITU-T X.1252: One or more attributes used to identify an entity within a context. 3.1.5 key b-ISO/IEC 9798-1: Sequence of symbols that controls the operation of a cryptographic transformation. 3.1.6 linking base b-ISO/IEC 20008-1: Public data element, optionally s

30、pecific to a group signature linker, which is involved in the group signature process if using this date element to link multiple signatures created by the same signer is required. 3.1.7 personally identifiable information (PII) b-ITU-T X.1252: Any information (a) that identifies or can be used to i

31、dentify, contact, or locate the person to whom such information pertains, (b) from which identification or contact information of an individual person can be derived, or (c) that is or can be linked to a natural person directly or indirectly. 3.1.8 privacy b-ITU-T X.1252: The right of individuals to

32、 control or influence what personal information related to them may be collected, managed, retained, accessed, and used or distributed. 3.1.9 pseudonym b-ITU-T X.1252: An identifier whose binding to an entity is not known or is known to only a limited extent, within the context in which it is used.

33、3.1.10 revocation b-ITU-T X.1252: The annulment by someone having the authority, of something previously done. 3.1.11 verification b-ITU-T X.1252: The process or instance of establishing the authenticity of something. 2 Rec. ITU-T X.1155 (10/2015) 3.1.12 verifier b-ITU-T X.1252: An entity that verif

34、ies and validates identity information. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 anonymous authentication: An authentication in which the personally identifiable information of a claimant is not known to the verifier. NOTE In cryptographic terms

35、, the level or strength of anonymity should be computed by a theoretical mechanism and an anonymous authentication should satisfy a certain level or strength of anonymity. However, this concern is not considered in this Recommendation. 3.2.2 anonymous claimant (or anonymous user): An entity (or serv

36、ice user) who uses anonymous authentication for preserving privacy. 3.2.3 anonymous identifier: An identifier which is not related to and is not used to infer the personally identifiable information of a claimant. Pseudonym is one example of anonymous identifier and is seen by a verifier, while rand

37、om value is used in anonymous authentication based on group signature. This random value should be treated securely as a cryptographic key and is not given to a verifier through the authentication process. 3.2.4 authentication token: A message consisting of data fields which contain information that

38、 is used to generate an authentication transaction for (entity) authentication. In (entity) authentication, an authentication token consists of an identifier and its corresponding key or secret credential such as password. Likewise, an authentication token used in anonymous authentication consists o

39、f an anonymous identifier and its corresponding key or secret credential. 3.2.5 authentication transaction: A message set exchanged in a particular communication for anonymous authentication between a claimant and a verifier. 3.2.6 complete anonymity: A situation where an entity is never identified

40、nor authenticated both in the present and in the future. 3.2.7 conditional traceability: A property where an entity can be traced with a specific condition. 3.2.8 controllable linkability: A property where linking is possible by an entity that possesses a special linking key. 3.2.9 full linkability:

41、 A property of anonymous authentication in which linking is always possible by any verifier. 3.2.10 issuer: An authorized entity that issues an (anonymous) authentication token to a claimant, confirming that the personally identifiable information of the claimant is presented and verified. 3.2.11 li

42、nkability: A property where linking is possible in anonymous authentication. 3.2.12 linking: Process used to determine whether two or more anonymous authentication transactions were performed by the same claimant, even if it is impossible to identify the specific claimant of these transactions. 3.2.

43、13 local linkability: A property where linking is possible only for multiple anonymous authentication transactions presented to the same verifier. 3.2.14 non-anonymous authentication: An authentication which is not anonymous authentication. In this authentication process, personally identifiable inf

44、ormation of a claimant is known to the verifier. 3.2.15 opener: An authorized entity that has a capability to find out an anonymous identifier from an anonymous authentication transaction using a special key called an opening key. Rec. ITU-T X.1155 (10/2015) 3 3.2.16 opening: Process by an authorize

45、d entity called an opener to find out an anonymous identifier from an anonymous authentication transaction. 3.2.17 signer-centric linkability: A property where linking multiple anonymous authentication transactions depends on the information that the signer owns or generates. 3.2.18 traceability: A

46、property where it is possible to find out the personally identifiable information of a claimant in anonymous authentication. 3.2.19 traceable anonymous service: The service in which it is sometimes necessary to trace the anonymous user. 3.2.20 tracer: An authorized entity that has a capability to fi

47、nd out the personally identifiable information from an anonymous identifier. 3.2.21 tracing: Process by an authorized entity called a tracer to find out the personally identifiable information of the claimant from an anonymous identifier. 3.2.22 tracking: Process to collect the previous authenticati

48、on transactions or other data of a claimant in order to infer the claimants privacy-related information. 3.2.23 unlinkability: A property where linking is always impossible by a verifier in anonymous authentication. 3.2.24 untraceability: A property where tracing is always impossible in anonymous au

49、thentication. 3.2.25 untraceable anonymous service: A service in which it is impossible to trace the anonymous user. 3.2.26 verifier-centric linkability: A property where linking multiple anonymous authentication transactions depends on the information that the verifier owns or generates. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: AI Anonymity Issuer BI Blind Issuer CA Certification Authority CL-GS Group Signature with Controllable Linkabili

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1