Login / Signup

Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem.

Maryam Sheikhi-GarjanMojtaba BahramianChristophe Doche
Published in: IET Inf. Secur. (2019)
Keyphrases