Sign in
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
Published in:
IACR Cryptol. ePrint Arch. (2003)
Keyphrases
</>
multi party
secret sharing
secret sharing scheme
visual cryptography scheme
privacy preserving
mental states
description language
high quality
low cost
efficient computation
key management
gray level