ICIEIS 2011: Informatics Engineering and Information Science pp 151-162 | Cite as
Comparative Analysis and Implementation of Certificateless Based Authentication Scheme
Abstract
Certificateless Public Key Infrastructure (CL-PKI) combines the merits of the trust management in Public Key Infrastructure (PKI) and the absence of certificate management in identity-based cryptosystem. Inspired by the advantages of CL-PKI, this paper presents the implementation of certificateless based authentication scheme called CLS. To prove the functionality and practicality of CLS authentication scheme, this paper presents a comprehensive performance analysis of various security levels of CLS in terms of public key size, signature block size and the execution time spent on signing and verification operations. The results show that various security levels of the CLS have direct influence on the length of public key and more importantly, the efficiency of the scheme in terms of bandwidth usage and run time.
Keywords
certificateless public key infrastructure bilinear pairing authentication scheme performancePreview
Unable to display preview. Download preview PDF.
References
- 1.Jancic, A., Warren, M.J.: PKI - Advantages and Obstacles. In: 2nd Australian Information Security Management Conference (2004)Google Scholar
- 2.Peyravian, M., Roginsky, A., Zunic, N.: Non-PKI Methods for Public Key Distribution. Computers & Security 23, 97–103 (2004)CrossRefGoogle Scholar
- 3.Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
- 4.Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
- 5.Terada, R., Denise, H.G.: A Certificateless Signature Scheme based in Bilinear Pairing Functions. In: Symposium on Cryptography and Information Security (2007)Google Scholar
- 6.Lifeng, G., Lei, H., Yong, L.: A Practical Certificateless Signature Scheme. In: International Symposium on Data, Privacy, and E-Commerce, pp. 248–253 (2007)Google Scholar
- 7.Wang, C., Huang, H., Tang, Y.: An Efficient Certificateless Signature from Pairings. In: International Symposium on Data, Privacy, and E-Commerce, pp. 236–238 (2007)Google Scholar
- 8.The Pairing-Based Cryptography (PBC) Library, http://crypto.stanford.edu/pbc/
- 9.Vixie, P., Gudmundsson, O., Eastlake, D., Wellington, B.: Secret Key Transaction Authentication for DNS (TSIG). RFC 2845 (2000)Google Scholar
- 10.Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (1999)Google Scholar
- 11.Yaacob, A.H., Ahmad, N.M., Fauzi, R.: IKE Authentication using Certificateless Signature. In: IEEE Proceedings of the 25th International Conference on Information Networking, ICOIN (2011)Google Scholar
- 12.Ahmad, N.M., Yaacob, A.H., Fauzi, R., Khorram, A.: Performance Analysis of Certificateless Signature for IKE Authentication. World Academy Science, Engineering and Technology 74, 358–365 (2011)Google Scholar
- 13.BIND - Internet Systems Consortium, http://www.isc.org/software/bind
- 14.Certicom Research: SEC1: Elliptic Curve Cryptography. In: Standards for Efficient Cryptography (2000)Google Scholar