Login / Signup
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves.
Massoud Hadian Dehkordi
Samaneh Mashhadi
Published in:
Comput. Commun. (2008)
Keyphrases
</>
secret sharing scheme
elliptic curve
secret sharing
key management
efficient computation
ad hoc networks
multi party
real time
high resolution
end to end