ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey paper on different approaches of Threshold Cryptography

Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 5)

Publication Date:

Authors : ; ; ;

Page : 18-23

Keywords : Mobile Ad hoc network; certificate authority; Ad hoc simultaneous search protocol; certificate revocation list.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A traditional key management service is based on a Certificate Authority or a Trusted Third party. Security solutions for traditional network are not suitable for Mobile ad hoc network. The characteristics of MANET presence a number of challenges to security such as self-configuring, wireless links, infrastructure less nature. Threshold cryptography has proved to be an effective technique for key distribution and management. In this paper we highlight the different approaches used for certificate generation, discovering and authentication of public keys.

Last modified: 2014-11-25 17:59:11