This section serves as a general model for non-repudiation mechanisms using cryptography as specified in other sections. The non-repudiation mechanism provided by GB/T 17903 can be used for non-repudiation in the following stages: a) evidence generation; b) evidence transmission, storage and retrieval; c) evidence verification. Arbitration of disputes is outside the scope of this standard.
GB/T 17903.1-2008 Referenced Document
GB 15851-1995 Information technology--Security techniques--Digital signature scheme giving message recovery
GB/T 15843.1-1999 Information technology-Security techniques-Entity authentication-Part 1: General
GB/T 17902.1 Information Technology Security Techniques Digital Signatures with Appendix Part 1: Overview*, 2023-03-17 Update
GB/T 17902.2 Information technology-Security techniques-Digital signatures with appendix-Part 2:Identity-based mechanisms
GB/T 17902.3 Information technology-Decurity techniques-Digital signatures with appendix-Part 3:Certificate-based mechanisms
GB/T 17903.2-2008 Information technology. Security techniques. Non-repudiation. Part 2: Mechanisms using symmetric techniques
GB/T 17903.3-2008 Information technology. Security techniques. Non-repudiation. Part 3: Mechanisms using asymmetric techniques*, 2008-07-02 Update
GB/T 18238.1 Information technology-Security techniques-Hash-function-Part 1:General
GB/T 18238.2 Information technology--Security techniques--Hash-functions Part 2:Hash-functions using an n-bit block cipher
GB/T 18238.3 Information technology--Security techniques--Hash-functions Part 3:Dedicated hash-functions
GB/T 18794.1-2002 Information technology--Open systems Interconnection-Security frameworks for open systems--Part 1: Overview
GB/T 18794.4-2003 Information technology-Open Systems Interconnection-Security frameworks for open systems-Part 4:Non-repudiation framework
GB/T 9387.2-1995 Information processing systems--Open Systems Interconnection--Basic Reference Model--Part 2: Security architecture
ISO/IEC 11770-3:1999 Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
ISO/IEC 9594-8:2001 Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks
GB/T 17903.1-2008 history
2008GB/T 17903.1-2008 Information technology. Security techniques. Non-repudiation. Part 1: General
1999GB/T 17903.1-1999 Information technology-Security techniques-Non-repudiation-Part 1: General