Sign in

(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application.

Dazeng YuanMingxing HeShengke ZengXiao LiLong Lu
Published in: UCC (2016)
Keyphrases
  • secret sharing scheme
  • access structure
  • secret sharing
  • key management
  • secret image
  • image processing
  • ground truth
  • spatial domain