Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper).
Ahmad Akmal Aminuddin Mohd KamalKeiichi IwamuraPublished in: IACR Cryptol. ePrint Arch. (2017)
Keyphrases
- key management
- secret sharing scheme
- secret sharing
- key distribution
- ad hoc networks
- resource constrained
- authentication mechanism
- security protocols
- wireless sensor networks
- encryption scheme
- visual cryptography
- private key
- visual cryptography scheme
- security analysis
- multi party
- mutual authentication
- security requirements
- smart card
- peer to peer
- feature extraction
- image segmentation