Describes entity authentication mechanisms based on identities and providing authentication, mechanisms based on integer factorization and providing unilateral authentication, mechanisms based on discrete logarithms with respect to numbers that are prime or composite and providing unilateral authentication, mechanisms based on asymmetric encryption systems and providing unilateral authentication, or mutual authentication, and mechanisms based on discrete logarithms on elliptic curves and providing unilateral authentication.