Login / Signup
Communication-Efficient Secure Computation of Encrypted Inputs Using (k, n) Threshold Secret Sharing.
Keiichi Iwamura
Ahmad Akmal Aminuddin Mohd Kamal
Published in:
IEEE Access (2023)
Keyphrases
</>
secret sharing
multi party
secure communication
secret sharing scheme
encryption scheme
electronic voting
visual cryptography scheme
resource constrained
secret image
digital images
lightweight
key management