Login / Signup
Manifesting Unobtainable Secrets: Threshold Elliptic Curve Key Generation using Nested Shamir Secret Sharing.
Joanne L. Hall
Yuval Hertzog
Michael Loewy
Matthew P. Skerritt
Dominique Valladolid
Geetika Verma
Published in:
CoRR (2023)
Keyphrases
</>
elliptic curve
secret sharing scheme
secret sharing
key management
scalar multiplication
secure communication
ad hoc networks
multi party
digital signature
wireless sensor networks
efficient computation
resource constrained
privacy preserving
encryption scheme