DocumentCode :
540259
Title :
Integrated authentications based on identities
Author :
Chu-Hsing Lin ; Ching-Te Wang, Ching-Te Wang
fYear :
1996
fDate :
2-4 Oct. 1996
Firstpage :
37
Lastpage :
41
Abstract :
In this paper, integrated entity authentication schemes based on the identity numbers of users are proposed. Entity authentication can be considered as a protection mechanism which prevents the forged entity to impersonate the legal entity or to fool other entities in a communication network. Basically, enciphering methods may be applied for the purpose of authenticity. After two entities have authenticated each other mutually, by using two-way verifying procedures, the shared session key is generated. Moreover, authentication schemes from three aspects of public-key or private-key methods, public-key ID-based methods, and ID-based methods are also investigated. Offensive actions such as parallel session attacks, interleaving attacks, and middle person relay attacks, to the presented schemes are resisted. Further, computational and space complexities, transmission efficiency, and security level are also analyzed
Keywords :
access protocols; authorisation; computational complexity; public key cryptography; ID-based method; communication network; computational complexity; enciphering methods; identities; identity numbers; integrated entity authentication schemes; private-key method; protection mechanism; public-key ID-based method; public-key method; security level; shared session key; space complexity; transmission efficiency; two-way verifying procedures;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1996. 30th Annual 1996 International Carnahan Conference
Conference_Location :
Lexington, Kentucky, USA
Print_ISBN :
0-7803-3537-6
Type :
conf
DOI :
10.1109/CCST.1996.551840
Filename :
5726980
Link To Document :
بازگشت