Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares.
Koen SimoensRoel PeetersBart PreneelPublished in: Pairing (2010)
Keyphrases
- visual cryptography scheme
- cellular automata
- mobile devices
- information sharing
- secret sharing
- threshold selection
- personal computer
- threshold values
- data sharing
- mobile applications
- embedded systems
- knowledge sharing
- intrusion detection
- real time
- fault tolerance
- secret key
- secret sharing scheme
- information security
- embedded devices
- electronic devices
- encryption algorithms
- information systems