Login / Signup
Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret.
Lukasz Krzywiecki
Adam Bobowski
Marta Slowik
Marcin Slowik
Patryk Koziel
Published in:
Comput. Networks (2020)
Keyphrases
</>
secret sharing scheme
secret sharing
visual cryptography
secret data
image quality
detection scheme
data embedding
database
data sets
automatic identification