Login / Signup
Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing.
Ashutosh Kumar
Raghu Meka
David Zuckerman
Published in:
Electron. Colloquium Comput. Complex. (2020)
Keyphrases
</>
secret sharing
multi party
secret sharing scheme
visual cryptography scheme
privacy preserving
hough transform
key management
description language
secret image
image sequences