ISO/IEC 20008-2:2013/Amd 1:2021
(Amendment)Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1
Technologies de l'information — Techniques de sécurité — Signatures numériques anonymes — Partie 2: Mécanismes utilisant une clé publique de groupe — Amendement 1
General Information
- Status
- Published
- Publication Date
- 15-Feb-2021
- Drafting Committee
- ISO/IEC JTC 1/SC 27/WG 2 - Cryptography and security mechanisms
- Current Stage
- 6060 - International Standard published
- Start Date
- 16-Feb-2021
- Due Date
- 12-Jun-2021
- Completion Date
- 16-Feb-2021
Relations
- Effective Date
- 04-Sep-2021
Overview
ISO/IEC 20008-2:2013/Amd 1:2021 is an amendment to the established international standard for information technology security techniques focused on anonymous digital signatures. Specifically, this amendment pertains to mechanisms using a group public key, enhancing privacy and security in digital signature implementations. Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), this document addresses both the technical additions and practical considerations relevant to organizations implementing group-based anonymous signature mechanisms.
Key Topics
- Anonymous Digital Signatures: Techniques that enable users to sign digital documents anonymously while allowing group-based verification.
- Group Public Key Mechanisms: Methods that utilize a single public key representing a group, enabling anonymity among signers.
- Object Identifiers: Annex A presents identifiers necessary for distinguishing between various signature mechanisms.
- Special Hash-Functions: Annex B specifies which hash functions must be used within the defined mechanisms.
- Security Guidelines: Annex C introduces updated best practices and restrictions to maintain the integrity and anonymity of digital signatures.
- Revocation Mechanisms: Annex D compares different signature revocation approaches for mitigating compromised keys or misuse.
- Numerical Examples: Annex E offers sample calculations to illustrate the application of digital signature mechanisms.
- Proof of Correct Generation: Annex F details how to verify the correct creation of signatures for particular mechanisms.
- Usage Restrictions: With Amendment 1, new guidance is provided, notably regarding environments where group membership management and signature opening are performed by the same entity.
Applications
ISO/IEC 20008-2:2013/Amd 1:2021 is used in multiple contexts to enhance digital security and privacy:
- Identity Management: Supports systems requiring anonymous authentication within a group, safeguarding user privacy while enabling secure access.
- Electronic Voting: Facilitates anonymous signatures for online voting systems, preserving voter confidentiality and ensuring integrity.
- Digital Contracts: Enables parties to enter agreements under a group identity, concealing individual signers' identities.
- Secure Communications: Used in messaging or collaboration platforms where participant anonymity is a requirement.
- Access Control: Strengthens the privacy of users accessing protected resources through anonymous group-based authentication.
The amendment helps technology providers, cybersecurity professionals, and system implementers make informed decisions when deploying group signature schemes, ensuring compliance with the latest security requirements and operational guidelines.
Related Standards
For organizations and professionals working with anonymous digital signatures and cryptographic security, the following related standards provide additional guidance and context:
- ISO/IEC 20008 Series: Comprehensive coverage of anonymous digital signature techniques and mechanisms.
- ISO/IEC 19790: Security requirements for cryptographic modules, relevant for implementations of group signature schemes.
- ISO/IEC 14888: Standards related to general digital signature schemes, including non-anonymous mechanisms.
- ISO/IEC 10118: Specifications for hash-functions, essential for anonymous signature operation.
- ISO/IEC 29191: Focused on anonymity-related services and technologies in information security.
By referencing ISO/IEC 20008-2:2013/Amd 1:2021, organizations can ensure that their anonymous signature mechanisms are aligned with best practices and international consensus, fostering secure and privacy-respecting digital interactions.
Get Certified
Connect with accredited certification bodies for this standard

BSI Group
BSI (British Standards Institution) is the business standards company that helps organizations make excellence a habit.

Bureau Veritas
Bureau Veritas is a world leader in laboratory testing, inspection and certification services.

DNV
DNV is an independent assurance and risk management provider.
Sponsored listings
Frequently Asked Questions
ISO/IEC 20008-2:2013/Amd 1:2021 is a standard published by the International Organization for Standardization (ISO). Its full title is "Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1". This standard covers: Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1
ISO/IEC 20008-2:2013/Amd 1:2021 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.
ISO/IEC 20008-2:2013/Amd 1:2021 has the following relationships with other standards: It is inter standard links to ISO/IEC 20008-2:2013. Understanding these relationships helps ensure you are using the most current and applicable version of the standard.
ISO/IEC 20008-2:2013/Amd 1:2021 is available in PDF format for immediate download after purchase. The document can be added to your cart and obtained through the secure checkout process. Digital delivery ensures instant access to the complete standard document.
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 20008-2
First edition
2013-11-15
AMENDMENT 1
2021-02
Information technology — Security
techniques — Anonymous digital
signatures —
Part 2:
Mechanisms using a group public key
AMENDMENT 1
Technologies de l'information — Techniques de sécurité — Signatures
numériques anonymes —
Partie 2: Mécanismes utilisant une clé publique de groupe
AMENDEMENT 1
Reference number
ISO/IEC 20008-2:2013/Amd.1:2021(E)
©
ISO/IEC 2021
ISO/IEC 20008-2:2013/Amd.1:2021(E)
© ISO/IEC 2021
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2021 – All rights reserved
ISO/IEC 20008-2:2013/Amd.1:2021(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that
are members of ISO or IEC participate in the development of International Standards through
technical committees established by the respective organization to deal with particular fields of
technical activity. ISO and IEC technical committees collaborate in fields of mutual interest. Other
international organizations, governmental and non-governmental, in liaison with ISO and IEC, also
take part in the work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for
the different types of document should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject
of patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent
rights. Details of any patent rights identified during the development of the document will be in the
Introduction and/or on the ISO list of patent declarations received (see www .iso .org/ patents) or th
...




Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...