International Journal of Computer Applications
In military areas where MANET is used, enemy can physically capture soldier mobile device and can use stored private key to sign unauthorized messages. To overcome this security issue Shamir's (t, n) threshold secret sharing scheme is used to protect stored private key. Using this scheme the user private key is decomposed into 'N' parts and distributed to 'N' nodes in network. So when user wants his private key to sign message he just requests 'T' or more key shares from any 'T' out of 'N' nodes to reconstruct private key. But t-1 shares can't reconstruct the private key.