Login / Signup
Towards optimal robust secret sharing with security against a rushing adversary.
Serge Fehr
Chen Yuan
Published in:
IACR Cryptol. ePrint Arch. (2019)
Keyphrases
</>
secret sharing
secret sharing scheme
electronic voting
key management
encryption scheme
multi party
visual cryptography scheme
similarity search
hough transform