Survey paper on different approaches of Threshold Cryptography
Journal: International Journal of Advanced Computer Research (IJACR) (Vol.2, No. 5)Publication Date: 2012-09-27
Authors : Neha Gupta; Manish Shrivastava; Aditya Goel;
Page : 18-23
Keywords : Mobile Ad hoc network; certificate authority; Ad hoc simultaneous search protocol; certificate revocation list.;
Abstract
A traditional key management service is based on a Certificate Authority or a Trusted Third party. Security solutions for traditional network are not suitable for Mobile ad hoc network. The characteristics of MANET presence a number of challenges to security such as self-configuring, wireless links, infrastructure less nature. Threshold cryptography has proved to be an effective technique for key distribution and management. In this paper we highlight the different approaches used for certificate generation, discovering and authentication of public keys.
Other Latest Articles
- Reduction of Co-Channel Interference in transmit/Receive diversity (TRD) in MIMO System
- FPGA Based Quadruple Precision Floating Point Arithmetic for Scientific Computations
- An Approach to Simplify Reversible Logic Circuits
- Review on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network?
- Ley de Thirlwall y tipo de cambio: Un análisis empírico para la economía mexicana de 2003 a 2012 mediante la metodología del modelo SVAR cointegrado
Last modified: 2014-11-25 17:59:11