Login / Signup
Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem.
Maryam Sheikhi-Garjan
Mojtaba Bahramian
Christophe Doche
Published in:
IET Inf. Secur. (2019)
Keyphrases
</>
secret sharing
elliptic curve
secret sharing scheme
chinese remainder theorem
secret image sharing
secret image
key management
visual cryptography
multi party
privacy preserving
efficient computation
encryption scheme
black and white