Login / Signup
Security analysis of a dynamic threshold secret sharing scheme using linear subspace method.
Sadegh Jamshidpour
Zahra Ahmadian
Published in:
Inf. Process. Lett. (2020)
Keyphrases
</>
security analysis
secret sharing scheme
encryption scheme
image encryption
subspace methods
secret sharing
public key
smart card
security requirements
data sets
key management
linear discriminant analysis
lossless compression
secret key
linear subspace