Login / Signup
How to Leak a Secret.
Ronald L. Rivest
Adi Shamir
Yael Tauman
Published in:
ASIACRYPT (2001)
Keyphrases
</>
information flow
private information
secret sharing scheme
secret sharing
secret key
secret information
databases
neural network
digital images
database
learning algorithm
hidden markov models
medical images
third party
secret data
visual cryptography