Login / Signup
The optimal attack-defense scheme for secret sharing.
Juan Ma
Yuling Chen
Xiao Lv
Xiaobin Qian
Published in:
iThings/GreenCom/CPSCom/SmartData/Cybermatics (2022)
Keyphrases
</>
secret sharing
secret sharing scheme
visual secret sharing
visual cryptography scheme
multi party
visual cryptography
key management
secret image
encryption scheme
ground truth
reconstructed image
black and white