Login / Signup
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Rui Xu
Kirill Morozov
Tsuyoshi Takagi
Published in:
IWSEC (2013)
Keyphrases
</>
secret sharing scheme
secret sharing
key management
encryption scheme
multi party
ad hoc networks
resource constrained
wireless sensor networks
black and white
privacy preserving
secret key
end to end
real time
low cost
elliptic curve
preprocessing
computational complexity