Login / Signup
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries.
Serge Fehr
Chen Yuan
Published in:
TCC (3) (2020)
Keyphrases
</>
secret sharing
electronic voting
secret sharing scheme
key management
encryption scheme
visual cryptography scheme
feature extraction
computational complexity
peer to peer