Login / Signup

Communication Efficient Secret Sharing in the Presence of Malicious Adversary.

Rawad BitarSidharth Jaggi
Published in: ISIT (2020)
Keyphrases
  • secret sharing
  • multi party
  • secret sharing scheme
  • end to end
  • data streams
  • information sharing
  • encryption scheme