Abstract
Certificateless Public Key Infrastructure (CL-PKI) combines the merits of the trust management in Public Key Infrastructure (PKI) and the absence of certificate management in identity-based cryptosystem. Inspired by the advantages of CL-PKI, this paper presents the implementation of certificateless based authentication scheme called CLS. To prove the functionality and practicality of CLS authentication scheme, this paper presents a comprehensive performance analysis of various security levels of CLS in terms of public key size, signature block size and the execution time spent on signing and verification operations. The results show that various security levels of the CLS have direct influence on the length of public key and more importantly, the efficiency of the scheme in terms of bandwidth usage and run time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jancic, A., Warren, M.J.: PKI - Advantages and Obstacles. In: 2nd Australian Information Security Management Conference (2004)
Peyravian, M., Roginsky, A., Zunic, N.: Non-PKI Methods for Public Key Distribution. Computers & Security 23, 97–103 (2004)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Terada, R., Denise, H.G.: A Certificateless Signature Scheme based in Bilinear Pairing Functions. In: Symposium on Cryptography and Information Security (2007)
Lifeng, G., Lei, H., Yong, L.: A Practical Certificateless Signature Scheme. In: International Symposium on Data, Privacy, and E-Commerce, pp. 248–253 (2007)
Wang, C., Huang, H., Tang, Y.: An Efficient Certificateless Signature from Pairings. In: International Symposium on Data, Privacy, and E-Commerce, pp. 236–238 (2007)
The Pairing-Based Cryptography (PBC) Library, http://crypto.stanford.edu/pbc/
Vixie, P., Gudmundsson, O., Eastlake, D., Wellington, B.: Secret Key Transaction Authentication for DNS (TSIG). RFC 2845 (2000)
Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (1999)
Yaacob, A.H., Ahmad, N.M., Fauzi, R.: IKE Authentication using Certificateless Signature. In: IEEE Proceedings of the 25th International Conference on Information Networking, ICOIN (2011)
Ahmad, N.M., Yaacob, A.H., Fauzi, R., Khorram, A.: Performance Analysis of Certificateless Signature for IKE Authentication. World Academy Science, Engineering and Technology 74, 358–365 (2011)
BIND - Internet Systems Consortium, http://www.isc.org/software/bind
Certicom Research: SEC1: Elliptic Curve Cryptography. In: Standards for Efficient Cryptography (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmad, N.M., Yaacob, A.H., Khorram, A., Tan, J., Ong, Y., Leong, Y. (2011). Comparative Analysis and Implementation of Certificateless Based Authentication Scheme. In: Abd Manaf, A., Zeki, A., Zamani, M., Chuprat, S., El-Qawasmeh, E. (eds) Informatics Engineering and Information Science. ICIEIS 2011. Communications in Computer and Information Science, vol 251. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25327-0_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-25327-0_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-25326-3
Online ISBN: 978-3-642-25327-0
eBook Packages: Computer ScienceComputer Science (R0)