Login / Signup

Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme.

Yuxia SunDan Liu
Published in: Mob. Networks Appl. (2017)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • multi party
  • visual cryptography scheme
  • secret key
  • key management
  • end to end
  • hash functions