Login / Signup
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
Raylin Tso
Ying Miao
Takeshi Okamoto
Eiji Okamoto
Published in:
Inf. Media Technol. (2006)
Keyphrases
</>
secret sharing scheme
secret sharing
authentication protocol
provably secure
lightweight
secret key
security analysis
secure communication
security model
multicast routing protocol
electronic voting
blind signature
authentication scheme
secret image
mobile nodes
formal analysis
multi party