Login / Signup

Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret.

Lukasz KrzywieckiAdam BobowskiMarta SlowikMarcin SlowikPatryk Koziel
Published in: Comput. Networks (2020)
Keyphrases
  • secret sharing scheme
  • secret sharing
  • visual cryptography
  • secret data
  • image quality
  • detection scheme
  • data embedding
  • database
  • data sets
  • automatic identification