Skip to main content

Comparative Analysis and Implementation of Certificateless Based Authentication Scheme

  • Conference paper
Informatics Engineering and Information Science (ICIEIS 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 251))

Abstract

Certificateless Public Key Infrastructure (CL-PKI) combines the merits of the trust management in Public Key Infrastructure (PKI) and the absence of certificate management in identity-based cryptosystem. Inspired by the advantages of CL-PKI, this paper presents the implementation of certificateless based authentication scheme called CLS. To prove the functionality and practicality of CLS authentication scheme, this paper presents a comprehensive performance analysis of various security levels of CLS in terms of public key size, signature block size and the execution time spent on signing and verification operations. The results show that various security levels of the CLS have direct influence on the length of public key and more importantly, the efficiency of the scheme in terms of bandwidth usage and run time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jancic, A., Warren, M.J.: PKI - Advantages and Obstacles. In: 2nd Australian Information Security Management Conference (2004)

    Google Scholar 

  2. Peyravian, M., Roginsky, A., Zunic, N.: Non-PKI Methods for Public Key Distribution. Computers & Security 23, 97–103 (2004)

    Article  Google Scholar 

  3. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  4. Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Terada, R., Denise, H.G.: A Certificateless Signature Scheme based in Bilinear Pairing Functions. In: Symposium on Cryptography and Information Security (2007)

    Google Scholar 

  6. Lifeng, G., Lei, H., Yong, L.: A Practical Certificateless Signature Scheme. In: International Symposium on Data, Privacy, and E-Commerce, pp. 248–253 (2007)

    Google Scholar 

  7. Wang, C., Huang, H., Tang, Y.: An Efficient Certificateless Signature from Pairings. In: International Symposium on Data, Privacy, and E-Commerce, pp. 236–238 (2007)

    Google Scholar 

  8. The Pairing-Based Cryptography (PBC) Library, http://crypto.stanford.edu/pbc/

  9. Vixie, P., Gudmundsson, O., Eastlake, D., Wellington, B.: Secret Key Transaction Authentication for DNS (TSIG). RFC 2845 (2000)

    Google Scholar 

  10. Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (1999)

    Google Scholar 

  11. Yaacob, A.H., Ahmad, N.M., Fauzi, R.: IKE Authentication using Certificateless Signature. In: IEEE Proceedings of the 25th International Conference on Information Networking, ICOIN (2011)

    Google Scholar 

  12. Ahmad, N.M., Yaacob, A.H., Fauzi, R., Khorram, A.: Performance Analysis of Certificateless Signature for IKE Authentication. World Academy Science, Engineering and Technology 74, 358–365 (2011)

    Google Scholar 

  13. BIND - Internet Systems Consortium, http://www.isc.org/software/bind

  14. Certicom Research: SEC1: Elliptic Curve Cryptography. In: Standards for Efficient Cryptography (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmad, N.M., Yaacob, A.H., Khorram, A., Tan, J., Ong, Y., Leong, Y. (2011). Comparative Analysis and Implementation of Certificateless Based Authentication Scheme. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25327-0_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25326-3

  • Online ISBN: 978-3-642-25327-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics