• DocumentCode
    540259
  • Title

    Integrated authentications based on identities

  • Author

    Chu-Hsing Lin ; Ching-Te Wang, Ching-Te Wang

  • fYear
    1996
  • fDate
    2-4 Oct. 1996
  • Firstpage
    37
  • Lastpage
    41
  • Abstract
    In this paper, integrated entity authentication schemes based on the identity numbers of users are proposed. Entity authentication can be considered as a protection mechanism which prevents the forged entity to impersonate the legal entity or to fool other entities in a communication network. Basically, enciphering methods may be applied for the purpose of authenticity. After two entities have authenticated each other mutually, by using two-way verifying procedures, the shared session key is generated. Moreover, authentication schemes from three aspects of public-key or private-key methods, public-key ID-based methods, and ID-based methods are also investigated. Offensive actions such as parallel session attacks, interleaving attacks, and middle person relay attacks, to the presented schemes are resisted. Further, computational and space complexities, transmission efficiency, and security level are also analyzed
  • Keywords
    access protocols; authorisation; computational complexity; public key cryptography; ID-based method; communication network; computational complexity; enciphering methods; identities; identity numbers; integrated entity authentication schemes; private-key method; protection mechanism; public-key ID-based method; public-key method; security level; shared session key; space complexity; transmission efficiency; two-way verifying procedures;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
  • Conference_Location
    Lexington, Kentucky, USA
  • Print_ISBN
    0-7803-3537-6
  • Type

    conf

  • DOI
    10.1109/CCST.1996.551840
  • Filename
    5726980