Performance Comparison of Efficient Identity Based Signature Schemes
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2014, Vol 2, Issue 6
Abstract
In a conventional public key crypto system, the participants must verify the certificate prior to use the public key. The main drawback of the certificate in conventional public key system are large storage, large computing time to store and verify each user’s public key and the corresponding certificate. Identity based cryptography is the new system which reduces the key management process in conventional public key infrastructures (PKI). Any public information such as the e-mail address, name, etc., can be used as a public key. This resolves the problem of getting the public key of a user and checking the validity of certificate. This paper provides a general idea of the Digital signature based on Identity based cryptography. The various efficient Identity Based Signature schemes are analyzed based various criteria like number of operations required for generation and verifying signature, size of the signature and number of paring operations.
Authors and Affiliations
S. Kuzhalvaimozhi, Dr. G. Raghavendra Rao
Custard Apple Seed Oil Anti-Fly Property: A Review
The house fly, Musca domestica L, has been identified as a vector for a variety of human and animal illnesses. Eradication of such pests needs the help of insecticides which in turn has led to the growth in insecticides...
Methods for Protection of Key in Private Key Cryptography
The susceptible nature of information against forthcoming threats has become a ponderous affair for the professionals of this field. It is a result of the rational and steady struggle by the carrying people that has prod...
A Review Study on Micro Grid with Distributed Energy Resources
Due to the financial, mechanical, and regular benefits of harmless to the ecosystem power-related DG units, a full relationship of the two kinds of microgrid systems is given. Considering the most recent investigation, t...
Innovative Empirical Approach for Intrusion Detection Using ANN
Intrusion detection system based on Artificial Neural Network (ANN) is a very active field that detects normal or attack connection on the network and can improve the performance of Intrusion detection system (IDS), the...
Efficient Secured Two Party Computing with Encrypted Data for Public Cloud
In this project we intervened certificateless encryption plan without matching operations for safely imparting public cloud. Intervened certificateless open key encryption (mCL-PKE –Mediated certificateless public key en...