{"id":385102,"date":"2024-10-20T03:29:05","date_gmt":"2024-10-20T03:29:05","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-275512021\/"},"modified":"2024-10-26T06:18:55","modified_gmt":"2024-10-26T06:18:55","slug":"bs-iso-iec-275512021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-275512021\/","title":{"rendered":"BS ISO\/IEC 27551:2021"},"content":{"rendered":"
This document provides a framework and establishes requirements for attribute-based unlinkable entity authentication (ABUEA).<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms 5 General objectives of attribute-based entity authentication <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 6 Properties of attribute-based entity authentication protocols 6.1 Correctness 6.2 Unforgeability 6.2.1 General 6.2.2 Replay protections 7 Unlinkability properties of attribute-based entity authentication protocols 7.1 General <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 7.2 Generic definition of unlinkability 7.3 Specific definitions of unlinkability 7.3.1 General <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.3.2 Passive outsider unlinkability (anti-tracking from passive outsiders) 7.3.3 Active outsider unlinkability (anti-tracking from active outsiders) 7.3.4 RP-U unlinkability (\u201canonymous visits\u201d to an RP) <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3.5 AP-U unlinkability 7.3.6 RP+AP-U unlinkability (anti-RP-AP-collusion) 7.3.7 AP-RP unlinkability (anti-tracking of RP from AP) 7.3.8 AP-RP+U unlinkability 7.3.9 RP+RP’-U unlinkability (anti-tracking of U from a set of colluding RPs) <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.4 Relationships between notions of unlinkability 7.5 Unlinkability levels for attribute-based entity authentication <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.6 Models 8 Attributes 8.1 Categories of attributes 8.1.1 Personal attributes 8.1.2 Self-claimed attributes 8.1.3 Verified attributes <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.1.4 Static attributes 8.1.5 Semi-static attributes 8.1.6 Dynamic attributes 8.1.7 Computed attributes 8.1.8 Identifying attributes 8.1.9 Supporting attributes 8.2 Verified attribute expiry and revocation 8.3 Attribute assurance 9 Requirements for level N attribute-based unlinkable entity authentication <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex A (informative) Formal definitions for security and unlinkability notions <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex B (informative) Examples of attribute-based entity authentication protocols <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex C (informative) <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex D (informative) Use cases for attribute-based unlinkable entity authentication <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security, cybersecurity and privacy protection. Requirements for attribute-based unlinkable entity authentication<\/b><\/p>\n |