Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Date Added: Jul 2015
Today, when communicating over the network, to send a message from one location to another the security is of utmost importance, because every user is concerned that the message reaches the desired destination without being modified enroute. To provide authentication, a scheme was developed which was based on polynomials. However, this scheme had problems i.e., the messages transferred to a particular node or to a node in a group suffered from threshold limit, only a limited number of messages can be transferred. Once the messages transferred are greater than the threshold the system can be easily corrupted by calculating the coefficients.