Login / Signup

Efficient Secret Sharing Schemes Based on Unauthorized Subsets.

Kouya Tochikubo
Published in: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2008)
Keyphrases
  • secret sharing scheme
  • ground truth
  • secret sharing
  • real time
  • data management
  • error correction