Sign in

Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries.

Serge FehrChen Yuan
Published in: TCC (3) (2020)
Keyphrases
  • secret sharing
  • electronic voting
  • secret sharing scheme
  • key management
  • encryption scheme
  • visual cryptography scheme
  • feature extraction
  • computational complexity
  • peer to peer