Sign in

Cryptanalysis on a (k, n)-Threshold Multiplicative Secret Sharing Scheme.

Ping LongBo MiDarong HuangHongyang Pan
Published in: CAA SAFEPROCESS (2019)
Keyphrases
  • secret sharing scheme
  • access structure
  • secret sharing
  • key management
  • visual cryptography
  • encryption scheme
  • secret key
  • visual cryptography scheme
  • black and white
  • digital libraries
  • data management
  • hash functions