Login / Signup
Communication Efficient Secret Sharing in the Presence of Malicious Adversary.
Rawad Bitar
Sidharth Jaggi
Published in:
ISIT (2020)
Keyphrases
</>
secret sharing
multi party
secret sharing scheme
end to end
data streams
information sharing
encryption scheme