Comparative analysis and implementation of certificateless based authentication scheme

2Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Certificateless Public Key Infrastructure (CL-PKI) combines the merits of the trust management in Public Key Infrastructure (PKI) and the absence of certificate management in identity-based cryptosystem. Inspired by the advantages of CL-PKI, this paper presents the implementation of certificateless based authentication scheme called CLS. To prove the functionality and practicality of CLS authentication scheme, this paper presents a comprehensive performance analysis of various security levels of CLS in terms of public key size, signature block size and the execution time spent on signing and verification operations. The results show that various security levels of the CLS have direct influence on the length of public key and more importantly, the efficiency of the scheme in terms of bandwidth usage and run time. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Ahmad, N. M., Yaacob, A. H., Khorram, A., Tan, J. F., Ong, Y. H., & Leong, Y. M. (2011). Comparative analysis and implementation of certificateless based authentication scheme. In Communications in Computer and Information Science (Vol. 251 CCIS, pp. 151–162). https://doi.org/10.1007/978-3-642-25327-0_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free