GB/T 17903.1-1999
Information technology-Security techniques-Non-repudiation-Part 1: General

2008-11
Standard No.
GB/T 17903.1-1999
Language
Chinese
Release Date
1999
Published By
General Administration of Quality Supervision, Inspection and Quarantine of the People‘s Republic of China
Replace By
GB/T 17903.1-2008
Lastest
GB/T 17903.1-2008
Scope
The non-repudiation service aims to generate, collect, maintain evidence about a declared event or action, and use this evidence to resolve disputes about the occurrence or non-occurrence of this event or action. This standard describes a model of a non-repudiation mechanism that provides evidence based on cryptography, and describes how to use symmetric or asymmetric cryptography to generate a cryptographic check value and form evidence. First, the non-repudiation mechanisms that are common to different non-repudiation services are described, and then these non-repudiation mechanisms are applied to a series of special non-repudiation services, such as: a) origination non-repudiation; b) delivery non-repudiation; c) submission non-repudiation; Repudiation; d) Transmission non-repudiation. Non-repudiation services generate evidence that is used to establish responsibility for an event or action. As far as the action or event for which evidence is produced, the entity responsible for the action or related to the event is called the subject of evidence. There are two main types of evidence, both of which essentially depend on the cryptography used: a) Secure Envelopes (SENV), formed by the evidence generating authority using symmetric cryptography. b) Digital signature, which is formed by the evidence generator or evidence generator using asymmetric cryptographic technology. The non-repudiation mechanism provides a protocol for exchanging non-repudiation tokens specific to each non-repudiation service. A non-repudiation token consists of a security envelope and/or a digital signature and optionally additional data. Non-repudiation tokens can be stored as non-repudiation information, which can later be used by both parties to the dispute or the arbitrator when arbitrating the dispute. According to the non-repudiation strategy used under the special application and the legal application environment of the application, the non-repudiation information may include the following additional information: a) Including evidence of a credible time stamp provided by the time stamping authority; b) Evidence provided by a notary, which can be data generated by one or more entities. Actions or events provide acknowledgment. Non-repudiation can only be provided within a clearly defined security policy for a particular application and its legal environment. This standard can be used as a general model for specifying non-repudiation mechanisms using cryptographic techniques in other parts. GB/T 17903 provides non-repudiation mechanisms for the following non-repudiation stages: a) Evidence generation;

GB/T 17903.1-1999 history

  • 2008 GB/T 17903.1-2008 Information technology. Security techniques. Non-repudiation. Part 1: General
  • 1999 GB/T 17903.1-1999 Information technology-Security techniques-Non-repudiation-Part 1: General

GB/T 17903.1-1999 -All Parts




Copyright ©2007-2023 ANTPEDIA, All Rights Reserved