International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 2, Issue - 5, September 2012
  1. 1
    Google Scholar
  2. 4
    Impact Factor
Survey paper on different approaches of Threshold Cryptography

Neha Gupta, Manish Shrivastava, Aditya Goel

Abstract

A traditional key management service is based on a Certificate Authority or a Trusted Third party. Security solutions for traditional network are not suitable for Mobile ad hoc network. The characteristics of MANET presence a number of challenges to security such as self-configuring, wireless links, infrastructure less nature. Threshold cryptography has proved to be an effective technique for key distribution and management. In this paper we highlight the different approaches used for certificate generation, discovering and authentication of public keys.

Keyword

Mobile Ad hoc network, certificate authority, Ad hoc simultaneous search protocol, certificate revocation list.

Cite this article

Refference