Comparative Analysis and Implementation of Certificateless Based Authentication Scheme

  • Nazrul M. Ahmad
  • Asrul H. Yaacob
  • Alireza Khorram
  • JinFu Tan
  • YiHao Ong
  • YewMeng Leong
Part of the Communications in Computer and Information Science book series (CCIS, volume 251)

Abstract

Certificateless Public Key Infrastructure (CL-PKI) combines the merits of the trust management in Public Key Infrastructure (PKI) and the absence of certificate management in identity-based cryptosystem. Inspired by the advantages of CL-PKI, this paper presents the implementation of certificateless based authentication scheme called CLS. To prove the functionality and practicality of CLS authentication scheme, this paper presents a comprehensive performance analysis of various security levels of CLS in terms of public key size, signature block size and the execution time spent on signing and verification operations. The results show that various security levels of the CLS have direct influence on the length of public key and more importantly, the efficiency of the scheme in terms of bandwidth usage and run time.

Keywords

certificateless public key infrastructure bilinear pairing authentication scheme performance 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jancic, A., Warren, M.J.: PKI - Advantages and Obstacles. In: 2nd Australian Information Security Management Conference (2004)Google Scholar
  2. 2.
    Peyravian, M., Roginsky, A., Zunic, N.: Non-PKI Methods for Public Key Distribution. Computers & Security 23, 97–103 (2004)CrossRefGoogle Scholar
  3. 3.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  4. 4.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Terada, R., Denise, H.G.: A Certificateless Signature Scheme based in Bilinear Pairing Functions. In: Symposium on Cryptography and Information Security (2007)Google Scholar
  6. 6.
    Lifeng, G., Lei, H., Yong, L.: A Practical Certificateless Signature Scheme. In: International Symposium on Data, Privacy, and E-Commerce, pp. 248–253 (2007)Google Scholar
  7. 7.
    Wang, C., Huang, H., Tang, Y.: An Efficient Certificateless Signature from Pairings. In: International Symposium on Data, Privacy, and E-Commerce, pp. 236–238 (2007)Google Scholar
  8. 8.
    The Pairing-Based Cryptography (PBC) Library, http://crypto.stanford.edu/pbc/
  9. 9.
    Vixie, P., Gudmundsson, O., Eastlake, D., Wellington, B.: Secret Key Transaction Authentication for DNS (TSIG). RFC 2845 (2000)Google Scholar
  10. 10.
    Eastlake, D.: Domain Name System Security Extensions. RFC 2535 (1999)Google Scholar
  11. 11.
    Yaacob, A.H., Ahmad, N.M., Fauzi, R.: IKE Authentication using Certificateless Signature. In: IEEE Proceedings of the 25th International Conference on Information Networking, ICOIN (2011)Google Scholar
  12. 12.
    Ahmad, N.M., Yaacob, A.H., Fauzi, R., Khorram, A.: Performance Analysis of Certificateless Signature for IKE Authentication. World Academy Science, Engineering and Technology 74, 358–365 (2011)Google Scholar
  13. 13.
    BIND - Internet Systems Consortium, http://www.isc.org/software/bind
  14. 14.
    Certicom Research: SEC1: Elliptic Curve Cryptography. In: Standards for Efficient Cryptography (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Nazrul M. Ahmad
    • 1
  • Asrul H. Yaacob
    • 1
  • Alireza Khorram
    • 1
  • JinFu Tan
    • 1
  • YiHao Ong
    • 1
  • YewMeng Leong
    • 1
  1. 1.Faculty of Information Science & Technology (FIST)Multimedia University (MMU)MelakaMalaysia

Personalised recommendations