Login / Signup
Efficient Secret Sharing Schemes Based on Unauthorized Subsets.
Kouya Tochikubo
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
</>
secret sharing scheme
ground truth
secret sharing
real time
data management
error correction