BS ISO/IEC 27551:2021
$167.15
Information security, cybersecurity and privacy protection. Requirements for attribute-based unlinkable entity authentication
Published By | Publication Date | Number of Pages |
BSI | 2021 | 44 |
This document provides a framework and establishes requirements for attribute-based unlinkable entity authentication (ABUEA).
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols and abbreviated terms 5 General objectives of attribute-based entity authentication |
12 | 6 Properties of attribute-based entity authentication protocols 6.1 Correctness 6.2 Unforgeability 6.2.1 General 6.2.2 Replay protections 7 Unlinkability properties of attribute-based entity authentication protocols 7.1 General |
13 | 7.2 Generic definition of unlinkability 7.3 Specific definitions of unlinkability 7.3.1 General |
15 | 7.3.2 Passive outsider unlinkability (anti-tracking from passive outsiders) 7.3.3 Active outsider unlinkability (anti-tracking from active outsiders) 7.3.4 RP-U unlinkability (“anonymous visits” to an RP) |
16 | 7.3.5 AP-U unlinkability 7.3.6 RP+AP-U unlinkability (anti-RP-AP-collusion) 7.3.7 AP-RP unlinkability (anti-tracking of RP from AP) 7.3.8 AP-RP+U unlinkability 7.3.9 RP+RP’-U unlinkability (anti-tracking of U from a set of colluding RPs) |
17 | 7.4 Relationships between notions of unlinkability 7.5 Unlinkability levels for attribute-based entity authentication |
18 | 7.6 Models 8 Attributes 8.1 Categories of attributes 8.1.1 Personal attributes 8.1.2 Self-claimed attributes 8.1.3 Verified attributes |
19 | 8.1.4 Static attributes 8.1.5 Semi-static attributes 8.1.6 Dynamic attributes 8.1.7 Computed attributes 8.1.8 Identifying attributes 8.1.9 Supporting attributes 8.2 Verified attribute expiry and revocation 8.3 Attribute assurance 9 Requirements for level N attribute-based unlinkable entity authentication |
21 | Annex A (informative) Formal definitions for security and unlinkability notions |
27 | Annex B (informative) Examples of attribute-based entity authentication protocols |
34 | Annex C (informative) |
41 | Annex D (informative) Use cases for attribute-based unlinkable entity authentication |
42 | Bibliography |