Login / Signup
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Yuanju Gan
Lihua Wang
Licheng Wang
Ping Pan
Yixian Yang
Published in:
Int. J. Distributed Sens. Networks (2013)
Keyphrases
</>
secret sharing scheme
secret sharing
key management
security protocols
encryption scheme
private key
authentication mechanism
visual cryptography
security mechanisms
visual cryptography scheme
ad hoc networks
resource constrained
wireless sensor networks
secret key
security analysis
information security
security requirements
elliptic curve
public key
intrusion detection
sensor networks
signcryption scheme
resource constraints
watermarking algorithm
authentication scheme
image encryption
high quality