Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Yuanju GanLihua WangLicheng WangPing PanYixian YangPublished in: Int. J. Distributed Sens. Networks (2013)
Keyphrases
- secret sharing scheme
- secret sharing
- key management
- security protocols
- encryption scheme
- private key
- authentication mechanism
- visual cryptography
- security mechanisms
- visual cryptography scheme
- ad hoc networks
- resource constrained
- wireless sensor networks
- secret key
- security analysis
- information security
- security requirements
- elliptic curve
- public key
- intrusion detection
- sensor networks
- signcryption scheme
- resource constraints
- watermarking algorithm
- authentication scheme
- image encryption
- high quality