Login / Signup

Non-malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate.

Antonio FaonioDaniele Venturi
Published in: CRYPTO (2) (2019)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • digital images
  • multi party
  • visual cryptography scheme
  • low cost
  • end to end
  • image processing
  • error correction
  • key management
  • secret image