Login / Signup

Threshold cryptography based on Asmuth-Bloom secret sharing.

Kamer KayaAli Aydin Selçuk
Published in: Inf. Sci. (2007)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • visual cryptography scheme
  • multi party
  • key management
  • face recognition
  • digital images
  • low cost
  • natural images
  • secret image
  • visual cryptography