Login / Signup
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
Raylin Tso
Ying Miao
Takeshi Okamoto
Eiji Okamoto
Published in:
IACR Cryptol. ePrint Arch. (2005)
Keyphrases
</>
secret sharing scheme
secret sharing
authentication protocol
key distribution
secret key
provably secure
signcryption scheme
lightweight
secure communication
formal analysis
security analysis
cryptographic protocols
trusted third party
mobile ipv
wireless local area network