accuris store logo
  • Browse all
  • 3A
  • 9000
  • A3
  • A4A
  • AA
  • AAMI
  • AASHTO
  • AATCC
  • ABCB
  • ABMA
  • ABMA-BOILER
  • ACC
  • ACGIH
  • ACI
  • ADA
  • ADS
  • AEIC
  • AENOR
  • AES
  • AFCEN
  • AGA
  • AGMA
  • AHAM
  • AHP
  • AHRI
  • AIA
  • AIAA
  • AICHE
  • AIHA
  • AIIM
  • AISC
  • ALI
  • ALPEMA
  • AMCA
  • ANS
  • ANSI
  • ANSI/ANSLG
  • ANSI/NEMA
  • ANSI/TCNA
  • ANSI/UAMA
  • API
  • APWA
  • AREMA
  • ARINC
  • ARMY
  • AS
  • ASA
  • ASABE
  • ASCE
  • ASD-STAN prEN
  • ASHE
  • ASHRAE
  • ASIS
  • ASM
  • ASME
  • ASNT
  • ASQ
  • ASSE (Plumbing)
  • ASSP
  • ASTM
  • ATIS
  • AVIXA
  • AWC
  • AWI
  • AWPA
  • AWS
  • AWWA
  • B11
  • BHMA
  • BICSI
  • BIFMA
  • BioWorld
  • BMI
  • BS
  • CAN/CGSB
  • CAN/ULC
  • CEI
  • CFR
  • CGA
  • CGSB
  • CIE
  • CII
  • CISPR
  • CLSI
  • CMAA
  • CRANE
  • CRSI
  • CSA
  • CTA
  • CTI
  • DID
  • DIN
  • DNV
  • DOD
  • DOXPUB
  • DVS
  • ECIA
  • EEC
  • EEMUA
  • ESD
  • ETSI
  • FCI
  • FED
  • FM Approvals
  • FORD
  • FRPI
  • GMW
  • GPA
  • HEI
  • HFES
  • HI
  • HIR
  • HPS
  • I3A
  • IADC
  • IAPMO
  • IATA
  • ICAO
  • ICC
  • ICEA
  • ICML
  • IEC
  • IEEE
  • IEEE/UL
  • IES
  • IEST
  • IFI
  • IICRC
  • INCITS
  • INTERN
  • IPC
  • ISA
  • ISEA
  • ISO
  • ISO/IEC/IEEE
  • ISPE
  • ISTA
  • ISUZU
  • JEDEC
  • JIS
  • LIA
  • MBMA
  • MCGRAW-HILL
  • MIL
  • MPIF
  • MSS
  • NAAMM
  • NACE
  • NADCA
  • NAS
  • NASA
  • NBBI
  • NCSL
  • NECA
  • NEMA
  • NETA
  • NFPA (Fire)
  • NFPA (Fluid)
  • NFSI
  • NG
  • NGA
  • NISO
  • NORSOK
  • NRC
  • NSC
  • NSF
  • NZS
  • OPEI
  • PCI
  • PDA
  • PEI
  • PIA
  • PIP
  • PPI
  • RTCA
  • SAE
  • SAIA
  • SCTE
  • SDI
  • SES
  • SIA
  • SJI
  • SMACNA
  • SME
  • SMPTE
  • SN EN
  • SPC
  • SPI
  • SSPC
  • STI/SPFA
  • TAPPI
  • TCIA
  • TEMA
  • THHILL
  • TIA
  • TMS
  • UL
  • ULC
  • UOP
  • WILEY
  • WRC
  • X9
Publishers
Need Help?
Log in
Create Account
Cart

Your shopping cart is empty.

Log in or create account

  1. Home
  2. ISO/IEC 9798-5:2004

ISO/IEC 9798-5:2004 Historical

1205981

Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

standard by International Organization for Standardization/International Electrotechnical Commission , 12/01/2004

This document has been replaced. View the most recent version.
This item is not available for sale.

Track This

Full Description

ISO/IEC 9798-5:2004 specifies authentication mechanisms in the form of exchange of information between a claimant and a verifier.

In accordance with the types of calculations that need to be performed by a claimant and the verifier (see Annex C), the mechanisms specified in ISO/IEC 9798-5:2004 can be classified into four main groups.

  • The first group is characterized by the performance of short modular exponentiations. The challenge size needs to be optimized since it has a proportional impact on workloads.
  • The second group is characterized by the possibility of a "coupon" strategy for the claimant. A verifier can authenticate a claimant without computational power. The challenge size has no impact on workloads.
  • The third group is characterized by the possibility of a "coupon" strategy for the verifier. A verifier without computational power can authenticate a claimant. The challenge size has no impact on workloads.
  • The fourth group has no possibility of a "coupon" strategy.
See more

Also Bought By Customers

 

Document History

  1. ISO/IEC 9798-5:2009

    December 2009
    Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

    • Most Recent  Most Recent
  2. ISO/IEC 9798-5:2004

    You are currently viewing this product 👀 currently
    viewing

    December 2004
    Information technology - Security techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques

    • Historical Version

Browse related products from International Organization for Standardization/International Electrotechnical Commission

  • International Organization for Standardization > By ICS Code > 35: Information technology. Office machines > 35.040: Character sets and information coding
  • International Organization for Standardization > By Technical Committee > JTC 1: Information technology > JTC 1/SC 27: IT Security techniques

Order Options

Unavailable

Product Details

Published:

12/01/2004

Number of Pages:

50
✕

Document Delivery Options

✕

What is a Secured PDF?

Secured PDFs are equipped with Digital Rights Management (DRM) software, by request of the Publisher to protect the copyright of the Publication, preventing unauthorized duplication and distribution.

What does this mean?

To view the PDF, a DRM tool, FileOpen must be installed. FileOpen is a free plugin which is compatible with Adobe Acrobat Reader DC and Pro DC, as well as other PDF Readers noted on the FileOpen website.

What can you do with a Secured PDF?

  • Print (except for IADC, ICML)
  • Search
  • Highlight
  • Bookmark

Restrictions:

  • Some Publishers do not allow printing.
  • Most Publishers do not permit copy and pasting from the PDF.
  • Sharing, Duplicating and Distribution prohibited.
  • For further information on restrictions, please click here.

PRODUCTS & SERVICES

  1. BPVC 2025
  2. BPVC Previous Editions
  3. Engineering Workbench
  4. Track It

CUSTOMER CARE

  1. Help Center
  2. Glossary
  3. Search Tips

CONNECT WITH US

  1. Contact Us

COMPANY INFORMATION

  1. About Accuris
  2. Press
  • © Copyright 2026 ACCURIS
  • Privacy Policy
  • System Information
Device/OS: Unknown
Browser: Unknown Browser 0.0
User Agent: Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)
Store Name: css
Page: /standards/iso-iec-9798-5-2004?product_id=1205981
Referrer: Direct Navigation
IP: 216.73.216.127
Language: en
Customer #: Not Logged In
Member?: NO
Cart #: 1463745573
Order #: None
Cookies: YES
×