Login / Signup

Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves.

Massoud Hadian DehkordiSamaneh Mashhadi
Published in: Comput. Commun. (2008)
Keyphrases
  • secret sharing scheme
  • elliptic curve
  • secret sharing
  • key management
  • efficient computation
  • ad hoc networks
  • multi party
  • real time
  • high resolution
  • end to end