Login / Signup

Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes.

Chris J. MitchellFred PiperMichael WalkerPeter R. Wild
Published in: Des. Codes Cryptogr. (1996)
Keyphrases
  • secret sharing scheme
  • key management
  • secret sharing
  • security analysis
  • key distribution
  • computational complexity