Performance Comparison of Efficient Identity Based Signature Schemes
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 6
Abstract
In a conventional public key crypto system, the participants must verify the certificate prior to use the public key. The main drawback of the certificate in conventional public key system are large storage, large computing time to store and verify each user’s public key and the corresponding certificate. Identity based cryptography is the new system which reduces the key management process in conventional public key infrastructures (PKI). Any public information such as the e-mail address, name, etc., can be used as a public key. This resolves the problem of getting the public key of a user and checking the validity of certificate. This paper provides a general idea of the Digital signature based on Identity based cryptography. The various efficient Identity Based Signature schemes are analyzed based various criteria like number of operations required for generation and verifying signature, size of the signature and number of paring operations.
Authors and Affiliations
S. Kuzhalvaimozhi, Dr. G. Raghavendra Rao
A Model of Intelligent Recommender System with Explicit Feedback Mechanism for Performance Improvement
Recommender Systems are intelligent applications designed to assist the user in a decision-making process whereby user wants to choose one item amongst the potentially overwhelming set of alternative products or services...
The Effect of Different Physical Treatment and Stimulation Temperature on OSL Decay Curve of Synthetic Quartz Material
Researchers reported, in natural quartz probability of re-trapping of electrons by shallow TL traps gets reduced for Optically Stimulated Luminescence (OSL) at around 160 0C and usual shape of OSL decay curve is obtained...
Multilevel Inverter Based Active Power Filter With Energy Balanced DC Link Capacitor
This paper presents the modeling of a multilevel cascaded H-bridge inverter for a three phase shunt active power filter (APF). Multilevel-cascaded inverter can give better performance compared to other topologies. The DC...
Detail Study of Cloud Infrastructure Attacks and Security Techniques
Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attack...
Effects of Two Modes of Computer Assisted Instruction on Pupils’ Achievement and Retention in English Language Spelling in Niger State- Nigeria
The study investigated the effects of two modes of Computer Assisted Tutorial, Drill and Practice Instructional packages (CAI) on Pupils Achievement and Retention in English Language Spelling in Niger State. Findings sho...