DocumentCode
540259
Title
Integrated authentications based on identities
Author
Chu-Hsing Lin ; Ching-Te Wang, Ching-Te Wang
fYear
1996
fDate
2-4 Oct. 1996
Firstpage
37
Lastpage
41
Abstract
In this paper, integrated entity authentication schemes based on the identity numbers of users are proposed. Entity authentication can be considered as a protection mechanism which prevents the forged entity to impersonate the legal entity or to fool other entities in a communication network. Basically, enciphering methods may be applied for the purpose of authenticity. After two entities have authenticated each other mutually, by using two-way verifying procedures, the shared session key is generated. Moreover, authentication schemes from three aspects of public-key or private-key methods, public-key ID-based methods, and ID-based methods are also investigated. Offensive actions such as parallel session attacks, interleaving attacks, and middle person relay attacks, to the presented schemes are resisted. Further, computational and space complexities, transmission efficiency, and security level are also analyzed
Keywords
access protocols; authorisation; computational complexity; public key cryptography; ID-based method; communication network; computational complexity; enciphering methods; identities; identity numbers; integrated entity authentication schemes; private-key method; protection mechanism; public-key ID-based method; public-key method; security level; shared session key; space complexity; transmission efficiency; two-way verifying procedures;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
Conference_Location
Lexington, Kentucky, USA
Print_ISBN
0-7803-3537-6
Type
conf
DOI
10.1109/CCST.1996.551840
Filename
5726980
Link To Document