Abstract :
In this paper, integrated entity authentication schemes based on the identity numbers of users are proposed. Entity authentication can be considered as a protection mechanism which prevents the forged entity to impersonate the legal entity or to fool other entities in a communication network. Basically, enciphering methods may be applied for the purpose of authenticity. After two entities have authenticated each other mutually, by using two-way verifying procedures, the shared session key is generated. Moreover, authentication schemes from three aspects of public-key or private-key methods, public-key ID-based methods, and ID-based methods are also investigated. Offensive actions such as parallel session attacks, interleaving attacks, and middle person relay attacks, to the presented schemes are resisted. Further, computational and space complexities, transmission efficiency, and security level are also analyzed
Keywords :
access protocols; authorisation; computational complexity; public key cryptography; ID-based method; communication network; computational complexity; enciphering methods; identities; identity numbers; integrated entity authentication schemes; private-key method; protection mechanism; public-key ID-based method; public-key method; security level; shared session key; space complexity; transmission efficiency; two-way verifying procedures;