Login / Signup

False-Bottom Encryption: Deniable Encryption From Secret Sharing.

Shahzad AhmadStefan RassPeter Schartner
Published in: IEEE Access (2023)
Keyphrases
  • encryption scheme
  • secret sharing
  • secret sharing scheme
  • key management
  • security analysis
  • authentication protocol
  • access control
  • public key