Login / Signup

Constructing Ideal Secret Sharing Schemes Based on Chinese Remainder Theorem.

Yu NingFuyou MiaoWenchao HuangKeju MengYan XiongXingfu Wang
Published in: ASIACRYPT (3) (2018)
Keyphrases
  • chinese remainder theorem
  • secret sharing scheme
  • secret image sharing
  • secret sharing
  • secret image
  • visual cryptography
  • key management
  • encryption scheme
  • cover image
  • end to end
  • resource constrained
  • black and white