Login / Signup
Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.
Mehrdad Nojoumian
Published in:
PST (2016)
Keyphrases
</>
secret sharing
secret sharing scheme
multi party
electronic voting
visual cryptography scheme
key management
encryption scheme
visual cryptography
preprocessing
secret image