Login / Signup

Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques.

Mehrdad Nojoumian
Published in: PST (2016)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • multi party
  • electronic voting
  • visual cryptography scheme
  • key management
  • encryption scheme
  • visual cryptography
  • preprocessing
  • secret image