Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.
Shimaa A. Abdel HakeemHyungWon KimPublished in: Sensors (2022)
Keyphrases
- secret sharing
- secure communication
- secret sharing scheme
- multi party
- authentication protocol
- security analysis
- visual cryptography scheme
- key distribution
- key management
- encryption scheme
- visual cryptography
- privacy preserving
- secret image
- smart card
- public key
- lightweight
- peer to peer
- provably secure
- trusted third party
- resource constrained
- elliptic curve
- end to end
- digital libraries